๐ Permission Hierarchies: Viewer to Admin
Understand how role levels grant increasing capabilities
Design access control for DAO operations
Your Progress
0 / 5 completed๐ Permission Hierarchy Design
Not all permissions are equal. DAOs must stratify access by risk level: Critical (treasury, upgrades), High (role changes, emergency controls), Medium (parameters, moderation), and Low (voting, viewing). Each tier requires different safeguardsโmulti-sig for critical, time-locks for high-risk, single admin for medium, and open access for low. Hierarchy isn't just about roles; it's about matching controls to consequences.
๐ฎ Interactive: Permission Risk Explorer
Select a permission to understand its risk level, required safeguards, and real-world attack scenarios. See how DAOs layer security controls.
Treasury Transfer
Execute token transfers from DAO treasury to external addresses. Highest risk permission.
Multiple signers + time delay required. Cannot be executed by single address.
Attacker with admin key drains $10M treasury to external wallet. Multi-sig prevents thisโneeds 3/5 approvals.
MakerDAO uses multi-sig (6/10) for treasury transfers. Even with admin compromise, attacker needs 5 more signers.
๐ Security Layers by Risk Tier
๐ก Key Insight
Permission hierarchies are about defense in depth. A single safeguard (e.g., admin-only) isn't enough for critical operations. You need layered security: multi-sig (multiple people), time-lock (temporal buffer), governance vote (community oversight), and audit (expert review). Think of it like a bank vaultโmultiple locks, cameras, guards, and time delays. Each layer makes attacks exponentially harder. The higher the risk, the more layers you add. Low-risk permissions (voting) can be permissionless; high-risk (treasury) must be fortress-level secure.