Security
Timelocks prevent sudden or unauthorized changes.
Example: If a vault manager’s private key is compromised, an attacker might attempt to whitelist a malicious token and swap vault assets into it. With a two-day timelock enabled, the change cannot be executed immediately. This gives managers and users a two-day window to detect the action and take steps to intervene before it is applied.
Example: If a vault manager’s private key is compromised, an attacker might attempt to whitelist a malicious token and swap vault assets into it. With a two-day timelock enabled, the change cannot be executed immediately. This gives managers and users a two-day window to detect the action and take steps to intervene before it is applied.
Transparency
Timelocks make proposed changes visible before execution.
Example: A manager proposes increasing the annual performance fee from 20 percent to 25 percent. With a seven-day timelock enabled, the change cannot be executed immediately. This gives users and managers a seven-day window to review the proposal and decide whether to remain in the vault or redeem before the change is applied.
Example: A manager proposes increasing the annual performance fee from 20 percent to 25 percent. With a seven-day timelock enabled, the change cannot be executed immediately. This gives users and managers a seven-day window to review the proposal and decide whether to remain in the vault or redeem before the change is applied.
The protocol does not enforce that the timelock duration must exceed the vault’s redemption period. Managers are responsible for setting appropriate configurations to ensure users have enough time to react before changes take effect.