# How to check the Lido DAO onchain vote #184
## 1. What the vote is about
[The Lido DAO on-chain vote #184](https://vote.lido.fi/vote/184) consists of nineteen independent steps (or items) and packs together the execution of the two different motions:
- Extend On-Chain Voting Duration, including:
- Extend On-Chain Voting Duration from 72h to 120h
- Change GateSeal on WithdrawalQueue and ValidatorsExitBusOracle
- Change CSM GateSeal
- Add Easy Track setups for funding Lido Ecosystem & Lido Labs BORG Foundations’ Operational Expenses Multisigs
## 2. Resources for the Proposal Validation
The resources listed in this section are considered trustworthy and reliable.
- [Lido Docs](https://docs.lido.fi) - use this to verify contract addresses
- [Blockchain Explorer Etherscan](https://etherscan.io) (or alternatives such as [Blockscout](https://www.blockscout.com)) - use this to review contract functionality, check the current state of contracts, and inspect available contract functions
- [Lido Research Forum](https://research.lido.fi) - use this to access original proposals, review details of proposed changes, and validate modification parameters
- [Snapshot](https://snapshot.box/#/s:lido-snapshot.eth) - use this to review finalized and pre-approved DAO versions of proposals
Direct links to relevant sources will be provided for each item in the vote, ensuring easy access to the associated information.
## 3. Voting scripts "translation" and verification
### I-a. Extend On-Chain Voting Duration from 72h to 120h
#### 1. Grant UNSAFELY_MODIFY_VOTE_TIME_ROLE to Aragon Voting [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e)
The vote calls the ["grantPermission"](https://etherscan.io/address/0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb#writeProxyContract#F3) function of the ["AragonACL"](https://etherscan.io/address/0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb) contract with the parameters mentioned below:
```
On [AragonACL]
0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb
function grantPermission(
address _entity,
address _app,
bytes32 _role
)
Call data:
[1] [AragonVoting] 0x2e59A20f205bB85a89C53f1936454680651E618e
[2] [AragonVoting] 0x2e59A20f205bB85a89C53f1936454680651E618e
[3] [UNSAFELY MODIFY VOTE TIME ROLE] 0x068ca51c9d69625c7add396c98ca4f3b27d894c3b973051ad3ee53017d7094ea
```
Key Verification Points:
- The Aragon Voting contract address [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The keccak of
`0x068ca51c9d69625c7add396c98ca4f3b27d894c3b973051ad3ee53017d7094ea` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#readProxyContract#F2)
- The Aragon Voting contract currently does not have `UNSAFELY_MODIFY_VOTE_TIME_ROLE`; verify it by executing [canPerform function](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#readProxyContract#F17) with the following parameters:
- sender: `0x2e59A20f205bB85a89C53f1936454680651E618e` (Aragon Voting contract address)
- role: `0x068ca51c9d69625c7add396c98ca4f3b27d894c3b973051ad3ee53017d7094ea` (UNSAFELY_MODIFY_VOTE_TIME_ROLE keccak)
- params: `0`
#### 2. Change Vote time from `259200` to `432000` on Aragon Voting [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e)
The vote calls the ["unsafelyChangeVoteTime"](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#writeProxyContract#F5) function of the ["AragonVoting"](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) contract with the parameters mentioned below:
```
On [AragonVoting]
0x2e59A20f205bB85a89C53f1936454680651E618e
function unsafelyChangeVoteTime(
uint64 _voteTime
)
Call data:
[1] 432000
```
Key Verification Points:
- The Aragon Voting contract address [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) matches the one previously used
- The current Voting Time is `259200` seconds (or 72 hours); verify it by executing [VoteTime function](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#readProxyContract#F21)
- The new voting duration time of 120 hours (or `432000` seconds) has been discussed on [the research forum](https://research.lido.fi/t/optimizing-lido-on-chain-voting-timelines-for-inclusive-governance/8265) and approved in the [Snapshot](https://snapshot.box/#/s:lido-snapshot.eth/proposal/0xa58da73cc4257837ae981d8ad861252f4cbbda7a173a577702f8f93561f57825)
#### 3. Change Objection Phase time from `86400` to `172800` on Aragon Voting [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e)
The vote calls the ["unsafelyChangeObjectionPhaseTime"](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#writeProxyContract#F3) function of the ["AragonVoting"](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) contract with the parameters mentioned below:
```
On [AragonVoting]
0x2e59A20f205bB85a89C53f1936454680651E618e
function unsafelyChangeObjectionPhaseTime(
uint64 _objectionPhaseTime
)
Call data:
[1] 172800
```
Key Verification Points:
- The Aragon Voting contract address [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) matches the one previously used
- The current Objection Phase Time is `86400` seconds (or 24 hours); verify it by executing [ObjectionPhaseTime function](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e#readProxyContract#F6)
- The new objection phase time of 48 hours (or `172800` seconds) has been discussed on [the research forum](https://research.lido.fi/t/optimizing-lido-on-chain-voting-timelines-for-inclusive-governance/8265) and approved in the [Snapshot](https://snapshot.box/#/s:lido-snapshot.eth/proposal/0xa58da73cc4257837ae981d8ad861252f4cbbda7a173a577702f8f93561f57825)
#### 4. Revoke `UNSAFELY_MODIFY_VOTE_TIME_ROLE` from Aragon Voting [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e)
The vote calls the ["revokePermission"](https://etherscan.io/address/0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb#writeProxyContract#F5) function of the ["AragonACL"](https://etherscan.io/address/0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb) contract with the parameters mentioned below:
```
On [AragonACL]
0x9895f0f17cc1d1891b6f18ee0b483b6f221b37bb
function revokePermission(
address _entity,
address _app,
bytes32 _role
)
Call data:
[1] [AragonVoting] 0x2e59A20f205bB85a89C53f1936454680651E618e
[2] [AragonVoting] 0x2e59A20f205bB85a89C53f1936454680651E618e
[3] [UNSAFELY MODIFY VOTE TIME ROLE] 0x068ca51c9d69625c7add396c98ca4f3b27d894c3b973051ad3ee53017d7094ea
```
Key Verification Points:
- The Aragon Voting contract address [0x2e59A20f205bB85a89C53f1936454680651E618e](https://etherscan.io/address/0x2e59A20f205bB85a89C53f1936454680651E618e) matches the one previously used
- The keccak of UNSAFELY_MODIFY_VOTE_TIME_ROLE `0x068ca51c9d69625c7add396c98ca4f3b27d894c3b973051ad3ee53017d7094ea` matches the one previously used
#### 5. Grant CONFIG_MANAGER_ROLE on OracleDaemonConfig [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) to Aragon Agent [0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c](https://etherscan.io/address/0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c)
The vote calls the ["grantRole"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#writeContract#F1) function of the ["OracleDaemonConfig"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 5.1
5.1. On [OracleDaemonConfig]
0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [CONFIG MANAGER ROLE] 0xbbfb55d933c2bfa638763473275b1d84c4418e58d26cf9d2cd5758237756d9f0
[2] [AragonAgent] 0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
```
Key Verification Points:
- The Aragon Agent contract address [0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c](https://etherscan.io/address/0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The OracleDaemonConfig contract address [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The keccak of CONFIG_MANAGER_ROLE `0xbbfb55d933c2bfa638763473275b1d84c4418e58d26cf9d2cd5758237756d9f0` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#readContract#F1)
- The Aragon Agent contract currently does not have CONFIG_MANAGER_ROLE; verify it by executing [hasRole function](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#readContract#F8) with the following parameters:
- role: `0xbbfb55d933c2bfa638763473275b1d84c4418e58d26cf9d2cd5758237756d9f0` (CONFIG_MANAGER_ROLE keccak)
- account: `0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c` (Aragon agent contract address)
#### 6. Update the FINALIZATION_MAX_NEGATIVE_REBASE_EPOCH_SHIFT parameter in the OracleDaemonConfig contract [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) to `0x08CA` (2250 epochs)
The vote calls the ["update"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#writeContract#F6) function of the ["OracleDaemonConfig"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 6.1
6.1. On [OracleDaemonConfig]
0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09
function update(
string _key,
bytes _value
)
Call data:
[1] FINALIZATION_MAX_NEGATIVE_REBASE_EPOCH_SHIFT
[2] 0x08ca
```
Key Verification Points:
- The OracleDaemonConfig contract address [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) matches the one previously used
- The current value of the FINALIZATION_MAX_NEGATIVE_REBASE_EPOCH_SHIFT 1350 (`0x0546` in hex) is published on [Lido docs](https://docs.lido.fi/guides/verify-lido-v2-upgrade-manual#oracledaemonconfig); additionally, verify it by executing [get function](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#readContract#F3) with the following parameter:
- key: `FINALIZATION_MAX_NEGATIVE_REBASE_EPOCH_SHIFT`
- The new FINALIZATION_MAX_NEGATIVE_REBASE_EPOCH_SHIFT value 2250 (`0x08CA` in hex) is published on [the research forum](https://research.lido.fi/t/optimizing-lido-on-chain-voting-timelines-for-inclusive-governance/8265/22)
#### 7. Revoke CONFIG_MANAGER_ROLE on OracleDaemonConfig [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) from Aragon Agent [0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c](https://etherscan.io/address/0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c)
The vote calls the ["revokeRole"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09#writeContract#F3) function of the ["OracleDaemonConfig"](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 7.1
7.1. On [OracleDaemonConfig]
0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [CONFIG MANAGER ROLE] 0xbbfb55d933c2bfa638763473275b1d84c4418e58d26cf9d2cd5758237756d9f0
[2] [AragonAgent] 0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
```
Key Verification Points:
- The Aragon Agent contract address [0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c](https://etherscan.io/address/0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c) matches the one previously used
- The OracleDaemonConfig contract address [0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09](https://etherscan.io/address/0xbf05A929c3D7885a6aeAd833a992dA6E5ac23b09) matches the one previously used
- The keccak of CONFIG_MANAGER_ROLE `0xbbfb55d933c2bfa638763473275b1d84c4418e58d26cf9d2cd5758237756d9f0` matches the one previously used
### I-b. Change GateSeal on WithdrawalQueue and ValidatorsExitBusOracle
#### 8. Grant PAUSE_ROLE on WithdrawalQueue [0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) for the new GateSeal [0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178](https://etherscan.io/address/0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178)
The vote calls the ["grantRole"](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1#writeProxyContract#F6) function of the ["WithdrawalQueue"](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 8.1
8.1. On [WithdrawalQueueERC721]
0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [GateSealProposed] 0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178
```
Key Verification Points:
- The WithdrawalQueue contract address [0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The new GateSeal address [0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178](https://etherscan.io/address/0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178) is published on [the research forum](https://research.lido.fi/t/renew-gateseal-for-the-withdrawal-queue-and-validator-exit-bus-oracle/7081/18)
- The keccak of `PAUSE_ROLE` `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1#readProxyContract#F10)
#### 9. Grant PAUSE_ROLE on ValidatorsExitBusOracle [0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) for the new GateSeal [0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178](https://etherscan.io/address/0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178)
The vote calls the ["grantRole"](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e#writeProxyContract#F2) function of the ["ValidatorsExitBusOracle"](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 9.1
9.1. On [ValidatorsExitBusOracle]
0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [GateSealProposed] 0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178
```
Key Verification Points:
- The ValidatorsExitBusOracle contract address [0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The new GateSeal address [0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178](https://etherscan.io/address/0xf9C9fDB4A5D2AA1D836D5370AB9b28BC1847e178) matches the one previously used
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e#readProxyContract#F7)
#### 10. Revoke PAUSE_ROLE on WithdrawalQueue [0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) from the old GateSeal [0x79243345eDbe01A7E42EDfF5900156700d22611c](https://etherscan.io/address/0x79243345eDbe01A7E42EDfF5900156700d22611c)
The vote calls the ["revokeRole"](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1#writeProxyContract#F17) function of the ["WithdrawalQueue"](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 10.1
10.1. On [WithdrawalQueueERC721]
0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [GateSeal] 0x79243345eDbe01A7E42EDfF5900156700d22611c
```
Key Verification Points:
- The WithdrawalQueue contract address [0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1](https://etherscan.io/address/0x889edC2eDab5f40e902b864aD4d7AdE8E412F9B1) matches the one previously used
- The old GateSeal address [0x79243345eDbe01A7E42EDfF5900156700d22611c](https://etherscan.io/address/0x79243345eDbe01A7E42EDfF5900156700d22611c) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one previously used
#### 11. Revoke PAUSE_ROLE on ValidatorsExitBusOracle [0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) from the old GateSeal [0x79243345eDbe01A7E42EDfF5900156700d22611c](https://etherscan.io/address/0x79243345eDbe01A7E42EDfF5900156700d22611c)
The vote calls the ["revokeRole"](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e#writeProxyContract#F8) function of the ["ValidatorsExitBusOracle"](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 11.1
11.1. On [ValidatorsExitBusOracle]
0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [GateSeal] 0x79243345eDbe01A7E42EDfF5900156700d22611c
```
Key Verification Points:
- The ValidatorsExitBusOracle contract address [0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e](https://etherscan.io/address/0x0De4Ea0184c2ad0BacA7183356Aea5B8d5Bf5c6e) matches the one previously
- The old GateSeal address [0x79243345eDbe01A7E42EDfF5900156700d22611c](https://etherscan.io/address/0x79243345eDbe01A7E42EDfF5900156700d22611c) matches the one previously used
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one previously used
### I-c. Change CSM GateSeal
#### 12. Grant PAUSE_ROLE on CSModule [0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) for the new CSM GateSeal [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0)
The vote calls the ["grantRole"](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F#writeProxyContract#F21) function of the ["CSModule"](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 12.1
12.1. On [CSModule]
0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSealProposed] 0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0
```
Key Verification Points:
- The CSModule contract address [0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#community-staking-module)
- The new CSM GateSeal address [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0) is published on [the research forum](https://research.lido.fi/t/renew-gateseal-for-the-withdrawal-queue-and-validator-exit-bus-oracle/7081/18)
- The keccak of `PAUSE_ROLE` `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F#readProxyContract#F9)
#### 13. Grant PAUSE_ROLE on CSAccounting [0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) for the new CSM GateSeal [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0)
The vote calls the ["grantRole"](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da#writeProxyContract#F10) function of the ["CSAccounting"](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 13.1
13.1. On [CSAccounting]
0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSealProposed] 0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0
```
Key Verification Points:
- The CSAccounting contract address [0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#community-staking-module)
- The new CSM GateSeal address [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0) is published on [the research forum](https://research.lido.fi/t/renew-gateseal-for-the-withdrawal-queue-and-validator-exit-bus-oracle/7081/18)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da#readProxyContract#F13)
#### 14. Grant PAUSE_ROLE on CSFeeOracle [0x4D4074628678Bd302921c20573EEa1ed38DdF7FB](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) for the new CSM GateSeal [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0)
The vote calls the ["grantRole"](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB#writeProxyContract#F2) function of the ["CSFeeOracle"](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 14.1
14.1. On [CSFeeOracle]
0x4D4074628678Bd302921c20573EEa1ed38DdF7FB
function grantRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSealProposed] 0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0
```
Key Verification Points:
- The CSFeeOracle contract address [0x4D4074628678Bd302921c20573EEa1ed38DdF7FB](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#community-staking-module)
- The new CSM GateSeal address [0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0](https://etherscan.io/address/0x16Dbd4B85a448bE564f1742d5c8cCdD2bB3185D0) is published on [the research forum](https://research.lido.fi/t/renew-gateseal-for-the-withdrawal-queue-and-validator-exit-bus-oracle/7081/18)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one that can be obtained via [Etherscan](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB#readProxyContract#F7)
#### 15. Revoke PAUSE_ROLE on CSModule [0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) from the old CSM GateSeal [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0)
The vote calls the ["revokeRole"](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F#writeProxyContract#F40) function of the ["CSModule"](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 15.1
15.1. On [CSModule]
0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSeal] 0x5cFCa30450B1e5548F140C24A47E36c10CE306F0
```
Key Verification Points:
- The CSModule contract address [0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F](https://etherscan.io/address/0xdA7dE2ECdDfccC6c3AF10108Db212ACBBf9EA83F) matches the one previously used
- The old CSM GateSeal address [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#community-staking-module)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one previously used
#### 16. Revoke PAUSE_ROLE on CSAccounting [0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) from the old CSM GateSeal [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0)
The vote calls the ["revokeRole"](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da#writeProxyContract#F26) function of the ["CSAccounting"](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 16.1
16.1. On [CSAccounting]
0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSeal] 0x5cFCa30450B1e5548F140C24A47E36c10CE306F0
```
Key Verification Points:
- The CSAccounting contract address [0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da](https://etherscan.io/address/0x4d72BFF1BeaC69925F8Bd12526a39BAAb069e5Da) matches the one previously used
- The old CSM GateSeal address [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one previously used
#### 17. Revoke PAUSE_ROLE on CSFeeOracle [0x4D4074628678Bd302921c20573EEa1ed38DdF7FB](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) from the old CSM GateSeal [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0)
The vote calls the ["revokeRole"](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB#writeProxyContract#F12) function of the ["CSFeeOracle"](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) contract with the parameters mentioned below:
```
On [AragonAgent]
0x3e40D73EB977Dc6a537aF587D48316feE66E9C8c
function forward(
bytes _evmScript
)
Call data:
[1] See parsed evm script at 17.1
17.1. On [CSFeeOracle]
0x4D4074628678Bd302921c20573EEa1ed38DdF7FB
function revokeRole(
bytes32 role,
address account
)
Call data:
[1] [PAUSE ROLE] 0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d
[2] [CSMGateSeal] 0x5cFCa30450B1e5548F140C24A47E36c10CE306F0
```
Key Verification Points:
- The CSFeeOracle contract address [0x4D4074628678Bd302921c20573EEa1ed38DdF7FB](https://etherscan.io/address/0x4D4074628678Bd302921c20573EEa1ed38DdF7FB) matches the one previously used
- The old CSM GateSeal address [0x5cFCa30450B1e5548F140C24A47E36c10CE306F0](https://etherscan.io/address/0x5cFCa30450B1e5548F140C24A47E36c10CE306F0) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts/#dao-contracts)
- The keccak of PAUSE_ROLE `0x139c2898040ef16910dc9f44dc697df79363da767d8bc92f2e310312b816e46d` matches the one previously used
### II. Add Easy Track setups for funding Lido Ecosystem & Lido Labs BORG Foundations’ Operational Expenses Multisigs
#### 18. Add an Easy Track EVM script factory [0xf2476f967C826722F5505eDfc4b2561A34033477](https://etherscan.io/address/0xf2476f967C826722F5505eDfc4b2561A34033477) for funding the Lido Ecosystem BORG Foundation’s operational multisig (AllowedRecipientsRegistry [0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4](https://etherscan.io/address/0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4))
The vote calls the ["addEVMScriptFactory"](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea#writeContract#F1) function of the ["EasyTrack"](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea) contract with the parameters mentioned below:
```
On [EasyTrack]
0xF0211b7660680B49De1A7E9f25C65660F0a13Fea
function addEVMScriptFactory(
address _evmScriptFactory,
bytes _permissions
)
Call data:
[1] 0xf2476f967C826722F5505eDfc4b2561A34033477
[2] 0xb9e5cbb9ca5b0d659238807e84d0176930753d86f6364846dadc4c36cd8f468a398c25d0d8aaf6a928b47ab466671229
```
Key Verification Points:
- The Easy Track contract address [0xF0211b7660680B49De1A7E9f25C65660F0a13Fea](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts)
- The new factory’s contract adresses (TopUpAllowedRecipients [0xf2476f967C826722F5505eDfc4b2561A34033477](https://etherscan.io/address/0xf2476f967C826722F5505eDfc4b2561A34033477), AllowedRecipientsRegistry [0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4](https://etherscan.io/address/0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4)) are published on [the research forum](https://research.lido.fi/t/establishment-of-lido-ecosystem-borg-foundation-as-a-lido-dao-adjacent-foundation/9345/15)
- The permission string consists of:
- `B9E5CBB9CA5b0d659238807E84D0176930753d86` - the [Aragon Finance](https://etherscan.io/address/0xB9E5CBB9CA5b0d659238807E84D0176930753d86) contract address (published in [docs](https://docs.lido.fi/deployed-contracts/#dao-contracts))
- `f6364846` - the Aragon Finance contract’s [«newImmediatePayment»](https://etherscan.io/address/0xB9E5CBB9CA5b0d659238807E84D0176930753d86#writeProxyContract#F13) function signature
- `DAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4` the [AllowedRecipientsRegistry](https://etherscan.io/address/0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4) contract address
- `66671229` - the AllowedRecipientsRegistry contract's [«Update spent amount»](https://etherscan.io/address/0xDAdC4C36cD8F468A398C25d0D8aaf6A928B47Ab4#writeContract#F9) function signature
#### 19. Add an Easy Track EVM script factory [0xE1f6BaBb445F809B97e3505Ea91749461050F780](https://etherscan.io/address/0xE1f6BaBb445F809B97e3505Ea91749461050F780) for funding the Lido Labs BORG Foundation’s operational multisig (AllowedRecipientsRegistry [0x68267f3D310E9f0FF53a37c141c90B738E1133c2](https://etherscan.io/address/0x68267f3D310E9f0FF53a37c141c90B738E1133c2))
The vote calls the ["addEVMScriptFactory"](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea#writeContract#F1) function of the ["EasyTrack"](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea) contract with the parameters mentioned below:
```
On [EasyTrack]
0xF0211b7660680B49De1A7E9f25C65660F0a13Fea
function addEVMScriptFactory(
address _evmScriptFactory,
bytes _permissions
)
Call data:
[1] 0xE1f6BaBb445F809B97e3505Ea91749461050F780
[2] 0xb9e5cbb9ca5b0d659238807e84d0176930753d86f636484668267f3d310e9f0ff53a37c141c90b738e1133c266671229
```
Key Verification Points:
- The Easy Track contract address [0xF0211b7660680B49De1A7E9f25C65660F0a13Fea](https://etherscan.io/address/0xF0211b7660680B49De1A7E9f25C65660F0a13Fea) is published on [Lido Docs](https://docs.lido.fi/deployed-contracts)
- The new factory’s contract adresses (TopUpAllowedRecipients [0xE1f6BaBb445F809B97e3505Ea91749461050F780](https://etherscan.io/address/0xE1f6BaBb445F809B97e3505Ea91749461050F780), AllowedRecipientsRegistry [0x68267f3D310E9f0FF53a37c141c90B738E1133c2](https://etherscan.io/address/0x68267f3D310E9f0FF53a37c141c90B738E1133c2)) are published on [the research forum](https://research.lido.fi/t/establishment-of-lido-labs-borg-foundation-as-a-lido-dao-adjacent-foundation/9344/18)
- The permission string consists of:
- `B9E5CBB9CA5b0d659238807E84D0176930753d86` - the [Aragon Finance](https://etherscan.io/address/0xB9E5CBB9CA5b0d659238807E84D0176930753d86) contract address (published in [docs](https://docs.lido.fi/deployed-contracts/#dao-contracts))
- `f6364846` - the Aragon Finance contract’s [«newImmediatePayment»](https://etherscan.io/address/0xB9E5CBB9CA5b0d659238807E84D0176930753d86#writeProxyContract#F13) function signature
- `68267f3D310E9f0FF53a37c141c90B738E1133c2` - the [AllowedRecipientsRegistry](https://etherscan.io/address/0x68267f3D310E9f0FF53a37c141c90B738E1133c2) contract address
- `66671229` - the [AllowedRecipientsRegistry](https://etherscan.io/address/0x68267f3D310E9f0FF53a37c141c90B738E1133c2) contract's «Update spent amount» function signature