Security
Timelocks prevent sudden or unauthorized changes.
Example: If a vault manager’s private key is compromised, an attacker might attempt to whitelist a malicious token and swap vault assets into it. With a two-day timelock enabled, the change cannot be executed immediately. This gives managers and users a two-day window to detect the action and take steps to intervene before it is applied.
Example: If a vault manager’s private key is compromised, an attacker might attempt to whitelist a malicious token and swap vault assets into it. With a two-day timelock enabled, the change cannot be executed immediately. This gives managers and users a two-day window to detect the action and take steps to intervene before it is applied.
Transparency
Timelocks make proposed changes visible before execution.
Example: A manager proposes increasing the annual performance fee from 20 percent to 25 percent. With a seven-day timelock enabled, the change cannot be executed immediately. This gives users and managers a seven-day window to review the proposal and decide whether to remain in the vault or redeem before the change is applied.
Example: A manager proposes increasing the annual performance fee from 20 percent to 25 percent. With a seven-day timelock enabled, the change cannot be executed immediately. This gives users and managers a seven-day window to review the proposal and decide whether to remain in the vault or redeem before the change is applied.