STEAL THIS CODE
Moloch whose love is endless oil and stone! Moloch whose soul is electricity and banks! Moloch whose poverty is the specter of genius! Moloch whose fate is a cloud of sexless hydrogen! Moloch whose name is the Mind!
Moloch! Moloch! Robot apartments! invisible suburbs! skeleton treasuries! blind capitals! demonic industries! spectral nations! invincible madhouses! granite cocks! monstrous bombs!
~ Allen Ginsberg, Howl
Moloch v2 is an upgraded version of MolochDAO that allows the DAO to acquire and spend multiple different tokens, instead of just one. It also introduces the Guild Kick proposal type which allows members to forcibly remove another member (their assets are refunded in full). Finally, v2 fixes the "unsafe approval" issue raised in the original Nomic Labs audit.
For a primer on Moloch v1, please visit the original documentation.
In developing Moloch v2, we stuck with our ruthless minimalism, deviating as little as possible from the original while dramatically improving utility. We skipped many features again and believe our design represents a Minimally Viable For-Profit DAO, yet one flexible enough to support a variety of use decentralized cases, including venture funds, hedge funds, investment banks, and incubators.
Moloch v2 is designed to extend MolochDAO's operations from purely single-token public goods grants-making to acquiring and spending (or investing in) an unlimited portfolio of assets.
Proposals in Moloch v2 now specify a tribute token and a payment token, which can be any whitelisted ERC20. Membership proposals offering tribute in exchange for shares can now offer any token, possibly helping balance the DAO portfolio. Grant proposals can now be in both shares and a stablecoin payment token to smooth out volatility risk, or even skip shares entirely to pay external contractors without awarding membership. Members can also propose trades to swap tokens OTC with the guild bank, which could be used for making investments, active portfolio management, selloffs, or just to top off a stablecoin reserve used to pay for planned expenses.
In order to limit legal liability on members of a for-profit deployment of Moloch v2, the members may opt to form a LAO. LAOs are DAOs wrapped in a legally compliant entity, such as an LLC or C-Corp. The LAO can enter legal contracts, custody offchain assets (e.g. SAFTs), and distribute dividends. Investors in a LAO must be accredited, but service providers compensated in LAO shares can earn their shares of the LAO portfolio.
To interface with offchain securities like SAFTs, the MolochLAO will issue security tokens that follow the Claims Token Standard ERC-1843 and the Simple Restricted Token Standard ERC-1404. Upon liquidation of a security, the LAO custodian would convert the proceeds to a token suitable for dividends (e.g. DAI) and send it to the claims token contract to be distributed to the claims token holders.
Members that ragequit and receive their fraction of a LAO-held security claims token will still be able to use their claims token to withdraw their dividends from the claims token contract.
Transfer restrictions will be enforced such that the security claims tokens can only be transferred to other DAO members, or other addresses whitelisted by the LAO admins.
To intall this project run npm install
.
To tests the contracts run npm run test
.
To compute their code coverage run npm run coverage
.
This project includes Buidler tasks for deploying and using DAOs and Pools.
Follow this instructions to deploy a new DAO:
- Edit
buidler.config.js
, setting the values forINFURA_API_KEY
andMAINNET_PRIVATE_KEY
. - Edit
deployment-params.js
, setting your desired deployment parameters. - Run
npx buidler moloch-deploy --network mainnet
- Edit
buidler.config.js
, setting the address of the DAO innetworks.mainnet.deployedContracts.moloch
.
Follow this instructions to deploy a new Pool:
- Edit
buidler.config.js
, setting the values forINFURA_API_KEY
andMAINNET_PRIVATE_KEY
. - Make sure you have the right address in
buidler.config.js
'snetworks.mainnet.deployedContracts.moloch
field. - Run
npx buidler pool-deploy --network mainnet --shares <shares> --tokens <tokens>
with the initial amount of tokens you want to donate to the pool, and how many shares you want in return.
This project has tasks to work with DAOs and Pools. To use them, you should first follow this instructions:
- Edit
buidler.config.js
, setting the values forINFURA_API_KEY
andMAINNET_PRIVATE_KEY
. - Make sure you have the right address in
buidler.config.js
'snetworks.mainnet.deployedContracts.moloch
field. - If you want to use a Pool, make sure you have the right address in
buidler.config.js
'snetworks.mainnet.deployedContracts.pool
field.
After following those instructions, you can run npx buidler
to get a list with all the tasks:
$ npx buidler
AVAILABLE TASKS:
clean Clears the cache and deletes all artifacts
compile Compiles the entire project, building all artifacts
console Opens a buidler console
flatten Flattens and prints all contracts and their dependencies
help Prints this message
moloch-deploy Deploys a new instance of the Moloch DAO
moloch-process-proposal Processes a proposal
moloch-ragequit Ragequits, burning some shares and getting tokens back
moloch-submit-proposal Submits a proposal
moloch-submit-vote Submits a vote
moloch-update-delegate Updates your delegate
pool-add-keeper Adds a keeper
pool-deploy Deploys a new instance of the pool and activates it
pool-deposit Donates tokens to the pool
pool-keeper-withdraw Withdraw other users' tokens from the pool
pool-remove-keeper Removes a keeper
pool-sync Syncs the pool
pool-withdraw Withdraw tokens from the pool
run Runs a user-defined script after compiling the project
test Runs mocha tests
You can run npx buidler help <task>
to get help about each tasks and their parameters. For example:
$ npx buidler help moloch-submit-proposal
Buidler version 1.0.0-beta.7
Usage: buidler [GLOBAL OPTIONS] moloch-submit-proposal --applicant <STRING> --details <STRING> --shares <STRING> --tribute <STRING>
OPTIONS:
--applicant The address of the applicant
--details The proposal's details
--shares The number of shares requested
--tribute The number of token's wei offered as tribute
moloch-submit-proposal: Submits a proposal
For global options help run: buidler help
To expect God to care about you or your personal values or the values of your civilization, that’s hubris.
To expect God to bargain with you, to allow you to survive and prosper as long as you submit to Him, that’s hubris.
To expect to wall off a garden where God can’t get to you and hurt you, that’s hubris.
To expect to be able to remove God from the picture entirely…well, at least it’s an actionable strategy.
I am a transhumanist because I do not have enough hubris not to try to kill God.
~ Scott Alexander, Meditations on Moloch
Moloch v2 is minimally different from Moloch v1, please read the original documentation first, and then the changelog below.
- removed constructor
- removed
approvedToken
reference - updated
withdraw
to support multi-token withdrawals - add
withdrawToken
to allow for token payments of specific amounts
In order to circumvent Solidity's 16 parameter "stack too deep" error we combined several proposal flags in the Proposal struct into the flags array.
struct Proposal {
// ...
bool[6] flags; // [sponsored, processed, didPass, cancelled, whitelist, guildkick]
// 0. sponsored - true only if the proposal has been submitted by a member
// 1. processed - true only if the proposal has been processed
// 2. didPass - true only if the proposal passed
// 3. cancelled - true only if the proposer called cancelProposal before a member sponsored the proposal
// 4. whitelist - true only if this is a whitelist proposal, NOTE - tributeToken is target of whitelist
// 5. guildkick - true only if this is a guild kick proposal, NOTE - applicant is target of guild kick
// ...
}
Add the following tribute/payment params to allow proposals to offer tribute and request payment in ERC20 tokens specified at the time. In theory they can be the same token, although that wouldn't make a lot of sense.
- add
uint256 tributeOffered
(renamed fromtokenTribute
) - add
IERC20 tributeToken
- add
uint256 paymentRequested
- add
IERC20 paymentToken
Track the whitelisted tokens in a mapping (to check if that token is on the whitelist) and an array (to iterate over them when ragequitting to give members a proportional share of all assets).
- add
mapping (address => IERC20) public tokenWhitelist
- add
IERC20[] public approvedTokens
- replace single
approvedToken
with an array:approvedTokens
- iterate through
approvedTokens
and save them to storage
- add tribute/payment token params
- enforce tribute/payment tokens are on whitelist
- save tribute/payment to proposal
- auto-fail the proposal if guild bank doesn't have enough tokens for requested payment
- on successful proposal, transfer requested payment tokens to applicant using
guildBank.withdrawToken
- withdraw proportional share of all whitelisted tokens by calling
guildBank.withdraw
with the array of approved tokens
- allow a member to specify the array of tokens to withdraw (and thus, which to leave behind) in case any whitelisted tokens get stuck in the guild bank
- tributeToken -> token to whitelist
- proposal.flags[4] -> whitelist flag
- add
mapping (address => bool) public proposedToWhitelist
to prevent duplicate active token whitelist proposals
- new function to propose adding a token to the whitelist
- enforces that the token address isn't null or already whitelisted
- saves a proposal with all other params set to null except the whitelist flag
and
tributeToken
address (tributeToken acts as token to whitelist)
- on a passing whitelist proposal, add the token to whitelist
- remove token from
proposedToWhitelist
so another proposal to whitelist the token can be made (assuming it failed)
Multi-token support comes with the risk of any individual token breaking or getting stuck in escrow if for whatever reason transfer restrictions prevent it from being transferred. For example, if the members add USDC to the whitelist, a proposal is made with USDC offered as tribute, and before the proposal is processed the applicant is added to the USDC blacklist, then should the proposal fail the applicant will be unable to have their escrowed USDC tribute offering returned to them because the USDC transfer would fail, which in turn would make the entire processProposal
function call fail. To make matters worse, because Moloch proposals must be processed in order, none of the proposals after the failing one would be able to be processed either, and even though the guild bank funds would be safe and could be ragequit, any escrowed tribute on active proposals would be stuck forever.
To counter this, we add a concept of emergencyProcessing
which kicks in for proposals that still haven't been processed after an emergencyExitWait
period (e.g 1 week) has passed from the time they should have been processed. During emergencyProcessing
, a proposal auto-fails (even if the votes were passing) but skips returning the escrowed tribute offered to the applicant.
Fortunately, after the stuck proposal is processed all subsequent proposals also stuck as result will be able to be processed immediately.
The emergency exit is the second line of defense after the token whitelist to defend against malicious or disfunctional tokens. If a whitelisted token breaks, however, any member can submit a proposal using the broken token as tribute and get it stuck in processing, so the best course of action is likely for the members to all ragequit and reform, and take extra precautions against whitelisting tokens with transfer restrictions.
- add
uint256 public emergencyExitWait
- save
emergencyExitWait
- if the proposal should have been processed more than
emergencyExitWait
periods ago, activeemergencyProcessing
and auto-fail the proposal - if
emergencyProcessing
has been activated, skip returning tribute to the applicant
As Nomic Labs explained in their audit report, approving ERC20 tokens to Moloch is unsafe.
Approving the Moloch DAO to transfer your tokens is, in general, unsafe. Users need to approve tokens to be a proposer or an applicant, but they can end up as the applicant of an unwanted proposal if someone attacks them, as explained in [MOL-L01].
This also has an impact in the UX, as submitting a proposal requires three transactions (2 approvals, 1 submitProposal call). This is in contrast to one of the most common UX pattern for approval, which consists of only calling approve once, with MAX_INT as value. If someone were to use that pattern, she will be in a vulnerable situation.
To fix this, we change the submission process from only allowing members to submit proposals to allowing anyone to submit proposals but then only adding them to the proposal queue when a member sponsors the proposal.
address proposer
is now whoever callssubmitProposal
(can be non-member)- add
address sponsor
which is the member that callssponsorProposal
- add
cancelled
to indicate if the proposal has been cancelled by its proposer - remove
aborted
which existed to address the unsafe approval vulnerability
- add
mapping (uint256 => Proposal) public proposals
to store all proposals by ID - change
uint256[] public proposalQueue
to only store a reference to the proposal by its ID - add
proposalCount
which monotonically increases on each proposal submission and acts as the ID
Note - as a result of this change, getting the proposal details from the proposal index changed across the codebase from proposalQueue[proposalIndex]
to proposals[proposalQueue[proposalIndex]]
as the former now only returns the proposal ID, which must be used to lookup the proposal details from the proposals
mapping.
- saves proposal by ID, but does not add it to the
proposalQueue
- transfers tribute tokens from the
msg.sender
(proposer
)
Because tribute always comes from the proposer
and not the applicant
, there is never a situation where someone else can initiate an action to pull your tokens into Moloch, so you are safe to approve Moloch once for the maximum amount of any token you wish to offer as tribute.
- can only be called by a member
- sponsor escrows the proposal deposit
- checks that proposal has not been sponsored or cancelled
- checks to prevent duplicate
tokenWhitelist
andguildKick
proposals - adds the proposal to the
proposalQueue
- if failing, refunds escrowed tribute to the proposer, not the applicant
If a proposal has been submitted but no members are interested in sponsoring it, the proposer needs a way to withdraw their escrowed tribute. They do this by calling cancelProposal
, which they can only do before a member sponsors the proposal.
- can only be called by proposal
proposer
(whoever calledsubmitProposal
) - checks that the proposal has not been already sponsored
- sets
cancelled
to true on the proposal - returns escrowed tribute to the proposer
The abort functionality existed primarily to address the unsafe approval vulnerability by allowing applicants to abort unexpected and/or malicious proposals and have their tribute returned. However, with the new submit -> sponsor process, there is no risk to approved funds and the abort function and all references can be safely removed.
To allow the members to take risks on new members, we add the guild kick proposal type. The guild kick proposal, if it passes, has the same effect as if a member ragequit 100% of their shares—they have their proportional share of all guild bank assets transferred to them.
- applicant -> member to kick
- proposal.flags[5] -> guild kick flag
- add
mapping (address => bool) public proposedToKick
to prevent duplicate active guild kick proposals
- new function to propose kicking a member
- enforces that the member exists (has shares)
- saves a proposal with all other params set to null except the guild kick flag
and the
applicant
address (applicant acts as member to kick)
- on a passing guild kick proposal, ragequit 100% of the member's shares
- remove member address from
proposedToKick
so another proposal to kick the member can be made (assuming it failed)
To enforce consistency of the proposal deposits and processing fees (which were previously simply the sole approvedToken
) we set a fixed depositToken
at contract deployment.
- add
IERC20 public depositToken
- save
depositToken
from the first value of theapprovedTokens
array
- collect proposal deposit from the sponsor
- transfer processing reward in
depositToken
to whoever calledprocessProposal
- return remaining deposit to proposer