Governance and Policy Layer setup
The policy layer of ORBT enforces governance and role management through timelocked, multi-signature EIP-712 actions. All Allocator permissions, limits, and parameters are managed through this layer.
Signers & thresholds
Roles
ADMIN: manages signer sets, cancels queued actions.SIGNER: addresses authorized to sign actions.
Thresholds
A minimum of 4 and maximum of 9 signatures are enforced on every action (configurable by governance via the
SET_THRESHOLDScore action).
Replay & duplication safety
Each action includes a nonce; the signed EIP-712 digest encodes
actionType,payloadHash,nonce, andtargetContract.Governance verifies signatures are from distinct SIGNERs; duplicates are rejected.
Digests are consumed on execution to prevent replays.
Action types & routing
Governance maintains a registry of valid action types (
bytes32identifiers).Core action types (e.g.,
REGISTER_ACTION_TYPE,SET_TIMELOCK,REGISTER_CONTRACT) are always allowed.Product actions (e.g.,
ACT_SET_ALLOCATOR,ACT_SET_ALLOCATOR_POCKETS) must be registered first viaREGISTER_ACTION_TYPE.
After timelock, actions are executed:
Core actions run inside ORBTGovernance.
All others are routed to the target governed contract (e.g., ORBT UCE) which exposes
executeGovernanceAction(actionType, payload).
Timelock
Each queued action receives an
ETA = now + actionTimeLock.Execution is only possible after ETA.
Admins can cancel queued actions before ETA; cancellations and executions emit events for auditability.
Last updated