โ†
Previous Module
Quadratic Voting Game

๐Ÿ“ˆ Permission Hierarchies: Viewer to Admin

Understand how role levels grant increasing capabilities

Design access control for DAO operations

๐Ÿ“Š Permission Hierarchy Design

Not all permissions are equal. DAOs must stratify access by risk level: Critical (treasury, upgrades), High (role changes, emergency controls), Medium (parameters, moderation), and Low (voting, viewing). Each tier requires different safeguardsโ€”multi-sig for critical, time-locks for high-risk, single admin for medium, and open access for low. Hierarchy isn't just about roles; it's about matching controls to consequences.

๐ŸŽฎ Interactive: Permission Risk Explorer

Select a permission to understand its risk level, required safeguards, and real-world attack scenarios. See how DAOs layer security controls.

Treasury Transfer

critical Risk Level

Execute token transfers from DAO treasury to external addresses. Highest risk permission.

๐Ÿ›ก๏ธ Required Safeguards
Admin + 3/5 Multi-sig

Multiple signers + time delay required. Cannot be executed by single address.

โš ๏ธ Attack Scenario

Attacker with admin key drains $10M treasury to external wallet. Multi-sig prevents thisโ€”needs 3/5 approvals.

๐Ÿ›๏ธ Real Example

MakerDAO uses multi-sig (6/10) for treasury transfers. Even with admin compromise, attacker needs 5 more signers.

๐Ÿ” Security Layers by Risk Tier

Critical (Treasury, Upgrades)
1.Multi-sig: Require M-of-N signatures (e.g., 3/5). Single key compromise cannot execute.
2.Time-lock: 24-48h delay between approval and execution. Community can detect and cancel.
3.Governance vote: Large proposals require community approval (e.g., >50% quorum).
4.Audit requirement: Smart contract changes must pass security review before deployment.
High (Role Changes, Emergency)
1.Admin-only: Restrict to admin role (fewer addresses than members).
2.Event logging: Emit on-chain events for all role changes (transparent audit trail).
3.Rate limiting: Maximum 1 emergency pause per week (prevents abuse).
Medium (Parameters, Moderation)
1.Moderator role: Separate from admin, limited to non-financial actions.
2.Community oversight: Moderators elected by governance, removable by vote.
Low (Voting, Viewing)
1.Open access: Anyone with tokens can participate (permissionless).
2.Spam protection: Token threshold (e.g., 0.1% supply) or identity verification.

๐Ÿ’ก Key Insight

Permission hierarchies are about defense in depth. A single safeguard (e.g., admin-only) isn't enough for critical operations. You need layered security: multi-sig (multiple people), time-lock (temporal buffer), governance vote (community oversight), and audit (expert review). Think of it like a bank vaultโ€”multiple locks, cameras, guards, and time delays. Each layer makes attacks exponentially harder. The higher the risk, the more layers you add. Low-risk permissions (voting) can be permissionless; high-risk (treasury) must be fortress-level secure.

โ† Introduction