C2 - Delegation
The Proposal may impact any or all of the following; Security and Functionality of Protocol/Ecosystem Contracts, Partnership and Service integrations to MahaDAO

In the context of governance, 'Delegation' simply refers to mutual consent of bestowing individual's voting power to another. This system can help counter the predominant voting power of whales, who may act in a biased position that is not aligned with the broader community. In addition, delegation introduces different elements of appeal, reputation, credibility, and expertise, which can help put voting support behind one another, irrespective of their personal wealth.

On the surface, it seems reasonable (if not ideal) to govern through the expertise, reputation, and credibility of individuals which is what delegation aims to leverage. However, unequal access to quality education, resources, and associate networks is a gross disadvantage that underpins a 'Meritocracy.' Primarily, these are socioeconomic factors that impact access and opportunity over accumulated generations. Still, this is more of an ethical matter that can still yield efficient and effective governance, albeit with room for improvement. In practical application, not always will the 'wisdom of the crowd' lead to the best outcome, regardless of popularity; this is especially true for proposals that are technical, complex, and highly sensitive. In this regard, nuance considerations are generally overlooked or incomprehensible to the layman. The ideal approach is to lean into delegates' relevant expertise, credibility, and reputation. In this way, consensus typically follows in hindsight, as any conceptual understanding will always be limited. The traditional beliefs held around plutocracies don't apply within the context of on-chain delegation. The reason being is unlike traditional election cycles and governments, a delegate's power may also be revoked at any time. This introduces additional and ongoing accountability on a proposal-by-proposal basis. In a way, an on-chain delegation is a form of representative democracy that has a much more responsive adjustment to individual preference. Even so, delegation still remains a more or less passive involvement for most, one where consensus is generally only evaluated in hindsight.

The Proposal may impact any or all of the following
  1. 1.
    Security and Functionality of Protocol/Ecosystem Contracts
  2. 2.
    Partnership and Service integrations to MahaDAO Ecosystem
C.2 Proposal types may utilize delegation, without requirement of a consensus pass as outlined in the follow chapter; "C.3 - Consensus Hybrid".
MahaDAO Delegate System
In this classification, we're primarily focused on the security of the protocol, and the protection of our community. This demands an emphasis on being able to identify not only malicious risks but also unintended consequences. Ideally, we encourage both technical and strategic specialists to consider delegate nomination.
  • Technical Proposals This refers to proposals that are attached with executable code or contract that will interact with the MahaDAO Protocol and/or ecosystem.
  • Partnership and Service integrations As we have witnessed many exploits and hacks around bridges and oracles, we have included this proposal type as high risk and of technical specialization.

If the DAO fails to protect the protocol from any malicious governance attack, then we have in place a 'Safety Check' that will ensure the protocol and community remains protected and secure. The 'Safety Check' is limited to the prevention of malicious proposals executing; it can not be used for an affirmative purpose to support a proposal. This backup security feature will be operated by anonymous individuals; this is to ensure their protection and privacy, whilst eliminating the opportunity to solicit preferences.

Once a submitted proposal has passed a vote, it will either observe a 7 or 30-day 'grace period' before execution. It is during this grace period that the proposal will be thoroughly evaluated for any malicious attack. If a threat is deemed present, the 'Safety Check' will be used to Veto the Proposal. In the unlikely event of this occurrence, a full disclosure report will be made available; detailing the prevented threat.
Copy link
Edit on GitHub
On this page
What is Delegation?
Theory
Proposal Applications
Safety Check
Grace Period