Edit scope
Conformance
1 new document
Conformance
Conformance characterizes the state in which a Synome Document accurately operationalizes the principles, rules, and processes specified by the Atlas Documents.
Atlas Edit Proposal · PR #242
179 documents changed · 117 edited, 62 new, 140 renumbered
This proposal includes the following edits:
Edit scope
1 new document
Conformance characterizes the state in which a Synome Document accurately operationalizes the principles, rules, and processes specified by the Atlas Documents.
Edit scope
14 new documents
This Article defines Synome Documents and the process by which they are modified.
The documents herein define what Synome Documents are, their relationship to Atlas Documents, and the principles that govern them.
The Atlas is part of a larger Synome. The Synome is the comprehensive machine-readable structure that contains the Atlas as its constitutional anchor node and additionally contains all other documents that operationalize the principles, rules, and processes specified by the Atlas. The Atlas is the human-readable, governance-voted entry point to the Synome.
Synome Documents are machine-readable documents within the Synome that are not Atlas Documents. They include, without limitation, specifications expressed in a programming language, formula files, and similar machine-readable artifacts that operationalize the principles, rules, and processes specified by the Atlas Documents, including those that are part of Agent Artifacts.
Synome Documents do not follow the hierarchical Document Identifier scheme of Atlas Documents specified in Document Identifiers. The organization of Synome Documents is determined by the logical dependencies between them, which emerge from the relationships among Synome Documents when the complete set is loaded together.
In any case of conflict between an Atlas Document and a Synome Document, the Atlas Document takes precedence. Synome Documents may include explanations or commentary, but such content is informative only and has no governance significance. The governance meaning of any principle, rule, or process is established solely in the Atlas Documents.
The documents herein specify the designation of the Synome Editor and the process by which the Synome Editor modifies Synome Documents through delegated authority. Synome Documents are not directly modified through any other process. Modifications to Atlas Documents that require corresponding changes to Synome Documents to maintain the supremacy specified in Supremacy Of Atlas Documents obligate the Synome Editor to make those conforming updates as specified in the documents herein.
The Synome Editor has the authority to modify Synome Documents. Modifications to Synome Documents made by the Synome Editor take effect without a Governance Poll or Executive Vote.
The Synome Editor role is held by Archon Labs.
Core GovOps, the Core Facilitator, and the Aligned Delegates must review modifications to Synome Documents made by the Synome Editor for conformance with the Atlas Documents as specified in Conformance and for misalignment of the Synome Editor as specified in Misalignment.
Where the parties specified in Review Obligation identify non-conformance between modifications to Synome Documents and the Atlas Documents, they must promptly report the non-conformance to the Synome Editor, and the Synome Editor must promptly correct it.
Any party may report misalignment of the Synome Editor to Core GovOps. Core GovOps must review such reports, but may dismiss reports it determines to be frivolous, abusive, or made in bad faith.
If Core GovOps determines that the Synome Editor is in misalignment as specified in Misalignment, Core GovOps must promptly propose removal of the designation specified in Designated Synome Editor through the standard Atlas Edit Process.
The Core Facilitator may pause the designation specified in Designated Synome Editor on an emergency basis pending consideration of removal as specified in Removal Of Designation. While the designation is paused, modifications to Synome Documents made by the Synome Editor do not take effect.
Edit scope
2 edited documents
Description:
Entity was an Aligned Delegate. Entity then secured a second role with an Ecosystem Actor providing Executive spellSpell crafting services, specifically as an "on call" dev. Entity claims it has never been on active duty in the second role; rather, they have only ever been on "standby" in that role. Thus, Entity argued it did not violate the Target Document despite holding two ecosystem roles.
Finding:
Misaligned
Additional Guidance:
If an actor assumes more than one role in the Sky ecosystem, the risks of conflict of interest, collusion, conspiracy and other misaligned behavior necessarily arises. That the Entity's second position is in an "on-call" or stand-by position does not negate this risk. Entity is still formally occupying two roles with different mandates, incentives and access/permissions. It is conceivable that Entity's decision-making in their first role could be compromised or influenced, even in subtle ways, by the experiences, knowledge and biases to which Entity is exposed in their second role. Therefore, the risk of misalignment, which the Target Document aims to guard against, remains present.
The Facilitator should derecognize Entity as an AD per A10 - Alignment Conservers - Accountability And Misalignment Handling - AC Derecognition.
No specific logic exists as yet for the adjudication of misalignment on the part of an Ecosystem Actor team member.
Description:
Entity was an Aligned Delegate. Entity then secured a second role with an Ecosystem Actor providing Executive spellSpell crafting services, specifically as an "on call" dev. Entity claims it has never been on active duty in the second role; rather, they have only ever been on "standby" in that role. Thus, Entity argued it did not violate the Target Document despite holding two ecosystem roles. During its investigation, the Facilitator discovered evidence that, despite the EA having a general policy that "on call" devs are paid only a nominal fee for the bounded time periods they are on call, Entity had been receiving an inordinately large compensation from the EA. When the Facilitator pressed both the EA and Entity for an explanation, none was given.
Finding:
Misaligned as to Entity.
Additional Guidance:
In contrast to the original Scenario, the Facilitator uncovered evidence that indicates Entity was not, as claimed, a mere "on call" dev, but rather was engaged in substantive work to justify the large compensation amount.
That the Facilitator was stonewalled in its investigation also is a strong indication of malign intent on the part of Entity and the EA. Yet, there is no concrete proof of this.
Under these circumstances, it is reasonable to extrapolate that derecognition from the AC role would suffice, per A10 - Alignment Conservers - Accountability And Misalignment Handling - AC Derecognition.
The concern remains that, potentially, a bad actor can continue to exploit the ecosystem, especially if other ecosystem participants are not aware of their questionable history. To mitigate this risk, the Facilitator can include details about the evidence it discovered in its formal derecognition notice, which can impact the reputation score of Entity.
Edit scope
1 edited document
The Core Facilitator is empowered with broad discretion in addressing situations where an Alignment Conserver, Ecosystem Actor or other relevant governance participant's actions are misaligned. See Adjudication Process, which defines the adjudication process that the Core Facilitator must follow in addressing Alignment Conserver misalignment.
The Core Facilitators'Facilitator's abuse of this discretionary power is severe misalignment. Any allegations of this abuse of power must be adjudicated by Core GovOps pursuant to the process defined in the above-cited document.
The Core Facilitator's failure to act promptly in addressing credible evidence of misalignment is considered an act of misalignment itself. Formal allegations of such failure must be adjudicated by Core GovOps to the same process referenced in the above-cited document.
Edit scope
1 edited document
The spellSpell teams need not share their identities. Therefore, it is no longer a requirement that spellSpell crafting teams publish the deployer of a smart contract. The spellSpell Checklists have been amended accordingly.
Edit scope
8 edited documents
The Executive Sheet serves as a planning instrument and documentation for the agreed content of the Spell. It is therefore one of the foundational documents in the Executive Process. Each Spell has a dedicated Executive Sheet. The Governance Point creates a new Executive Sheet for each Executive Vote cycle, listing every executive item intended for inclusion in that cycle along with the provenance of each item. In this way, the Executive Sheet helps ensure transparency and verification in the Executive Process. Past Executive Sheets are preserved in order to provide a record of Executive Votes and their provenance.
The Executive Sheet (also referred to as the "exec sheet" or "sheet") is maintained on a large Google Sheets spreadsheet with several tabs. Each Executive Vote has its own tab, whose title is the designated Target Date for each spellSpell.
The Executive Sheet provides a publicly visible list of plain-English instructions outlining the executive actions performed in a given spellSpell. Each executive action is populated in the Executive Sheet under a column and broken down into input actions (high-level actions) and derived actions (resulting from input actions).
The Executive Sheet is used by several actors in the Executive Process. It is managed and populated by the Governance Point, used by stakeholders, who are required to provide confirmation for proposed executive items, and by the Spell Team. The Executive Sheet is the source of truth for the Spell Crafter who crafts the Spell based on its content. Only the Core Facilitators haveFacilitator has write access to the Executive Sheet.
The Executive Document (also referred to as the "Executive Copy," "executive," "Executive Proposal," or "exec doc") is a formal, plain-English Markdown document that serves as the primary communication tool for presenting the contents of an Executive Vote to the community. Created after the Executive Sheet is finalized, it provides a detailed breakdown of the actions proposed in the Executive Vote. Unlike the Executive Sheet, which organizes actions in a cell-based format, the Executive Document expresses these actions in sentence format for improved readability.
Each Executive Document corresponds to a specific spellSpell and describes the actions that the spellSpell will perform if executed. It is a critical tool for ensuring transparency, clarity, and alignment among stakeholders. The document serves as a proposal that can be voted on and either approved or rejected by Sky Governance. The Core Facilitators areFacilitator is responsible for producing and finalizing the Executive Document; and any changes must be made by them.
The Executive Document is designed to be accessible to both technical and non-technical members of the Sky Ecosystem. It enables Aligned Delegates and SKY holders to understand the actions that will be executed when the spellSpell is cast. Its contents are publicly visible on the Voting Portal, where Aligned Delegates review it before voting on the spellSpell. In addition to serving as a reference for voters, the Executive Document also guides the Spell Team in developing and finalizing the Spell, ensuring that the proposed actions are accurately implemented. The contents of the Executive Document are hashed and included within the Spell code to provide an additional layer of verification.
The custom spellSpell voting page is the public interface used to submit, review, and vote on Executive Votes that are not accompanied by a formal Executive Document. It also supports voting on pre-deployed standby spellsSpells by allowing stakeholders to specify target contract addresses and calldata directly. The custom spellSpell voting page can be found at https://vote.sky.money/custom-spell.
Spell is a term specific to the Sky Protocol. It refers to all technical components of an Executive Vote, encompassing the codebase, code operations, code reviews, and overall code quality. The term "spellSpell" is often used interchangeably with the Executive Vote itself, as it represents the smart contract responsible for enacting changes to the protocol. Spells are categorized as either "regular" or "out-of-schedule." Regular spellsSpells adhere to a biweekly cadence, while out-of-schedule spellsSpells are handled with service-level agreements (SLAs) determined on a case-by-case basis.
Ecosystem Spell Validation (also referred to as "spellSpell validation" or "validation") refers to the process of performing a set of checks and high-level review of a specific spell’sSpell’s code as it exists on the blockchain (referred to as a "deployed spellSpell"). This process applies only to the deployed spellSpell and is not as comprehensive as the reviews conducted during the spellSpell development process by the Spell Reviewers. The purpose of spellSpell validation is to validate the safety of the current spellSpell in respect to its security impacts in relation to Sky Protocol smart contracts.
Each Executive Vote has a dedicated Spell Team, made up of Spell Crafters and Spell Reviewers. The Spell Team must include one Crafter, who is responsible for crafting the spellsSpells. The Spell Team must also include at least two Reviewers, responsible for reviewing and confirming that the spellsSpells are ready for the Executive Vote, at least one of whom should be a member of a different Ecosystem Actor than the Spell Crafter. A Crafter cannot serve as a Reviewer for the same spellSpell. The Spell Team is a set of technical contributors working on developing all technical and smart-contract-related aspects of a particular Executive Vote, based on instructions set out by the Governance Point.
The Spell Crafter (the Crafter) is the person or entity who parses the written instruction set of a proposed Executive to Solidity code in order to develop the spellSpell in the first instance. Every addition, modification, or removal of code or content within the spellSpell must be performed by the Crafter. The designated Spell Crafter must be rotated, such that the same person does not craft the spellsSpells for two consecutive Executive Votes. The Spell Crafter is a member of the Spell Team for a particular Executive Vote.
The Spell Reviewers (the Reviewers) are the people or entities responsible for reviewing the draft spellSpell as parsed by the Spell Crafter. The Reviewers are responsible for verifying the spellSpell, finding issues and catching bugs and mistakes in the spellSpell, and otherwise ensuring its quality. There is an important delineation between the function of Spell Crafters and Spell Reviewers: the Reviewers may not perform any addition, modification or removal of code or content within the spellSpell, although they may suggest changes to the Spell Crafter. Spell Reviewers are members of the wider Spell Team for a particular Executive Vote.
Edit scope
4 edited documents
The Governance Point is selected from the Core Facilitatorsthe Core Facilitator. Currently, the only Core Facilitator is JanSky. Each Spell also has a designated Governance Backup. The Governance Backup is required to assume the responsibilities of the Governance Point if the original Governance Point becomes unavailable, effectively stepping into the role as needed. The Governance Point is responsible for coordinating the Executive Vote and ensuring that the information in the Executive Sheet accurately reflects the progress of the spellSpell.
The Technical Point has domain expertise as the crafter of the smart contracts, but the Governance Point also has crucial context and should serve as a cross-check to the extent they can. The Governance Point is expected to ask questions where needed.
The Technical Point role is filled by the Spell Team or the Spell Crafter from that group. For each Executive Vote, a Spell Team is selected from the Spell Roster to steward the spellSpell development process.
Within the Spell Team, the Spell Crafter serves as the primary point of contact for the Governance Point and any external parties. If the Spell Crafter is unavailable or if disagreements arise, the Governance Point’s secondary point of contact is the Spell Reviewers.
Input or opinions from external parties on technical details should be treated as informational and should not influence the spellSpell decision-making process.
The Spell Team consists of the Crafter(s) and Reviewers for a designated spellSpell.
Currently, Sky has two teams of technical contributors for spellSpell development, Dewiz, and Sidestream. They rotate the responsibility of crafting and reviewing as follows:
The Content Liaisons are the stakeholders involved in a specific spellSpell. They participate in the verification process and confirm the accuracy of items relevant to their area of expertise, to ensure accuracy of those items in the Executive Sheet. Many different actors in the Sky Ecosystem serve as Content Liaisons for Executive Votes.
Edit scope
2 edited documents
Office hours are set to "Yes" if a spellSpell introduces major changes that can affect external parties, or if a stakeholder makes a specific request for the office-hours modifier to be switched on. Typical examples include collateral offboarding, onboarding new modules, oracle changes, and other actions that may have a significant impact on the protocol or its users.
While stakeholders can request that Office Hours be switched on, the final decision and responsibility for setting this parameter rests with the Spell Crafter. If the office hours modifier is on, the spellSpell can only be executed between 14:00 and 21:00 UTC, Monday - Friday. The purpose of this modifier is to ensure that Ecosystem Actors are available to address any issues that may arise during or shortly after the execution of the spell. The spellSpell. The Spell will have an extra restriction on top of the GSM Pause Delay, meaning it can only be cast during that timeframe, regardless of when it was approved.
The Order of Operations parameter is relevant when actions within a spellSpell, or across multiple spellsSpells, must be executed in a specific order to ensure that the correct final value is set. This applies to cases where dependencies, conflicting changes, or timing-sensitive modifications require precise sequencing to achieve the intended outcome. The Order of Operations parameter is set to "Yes" when actions must be executed in a specific order.
Edit scope
1 edited document
The module is usually deployed eight or seven days prior to the spellSpell.
Edit scope
1 edited document
Prime Spell Security Enforcement establishes binding enforcement and formal recordkeeping for Prime Agent spellSpell security during the period when the Prime Spell Security Framework is progressively codified and operationalized in the Atlas. Its objective is to protect the Executive Process by ensuring that Prime Agents adhere to all applicable security requirements.
Edit scope
1 edited document
The penalties for a Prime Spell Security Incident may include, without limitation:
Edit scope
1 edited document
Prime Agents are expected to review the Prime Spell Security Incident Registry on an ongoing basis and to independently incorporate mitigations and controls based on relevant prior incidents into their spell-developmentSpell-development related processes.
Edit scope
23 new documents
The documents herein define the Prime Spell Process, the end-to-end procedure through which Prime Agents bring proposed actions through governance and into Sky Core Spells for on-chain execution. The Prime Spell Process spans four (4) weeks, from initial proposal through publication of the Sky Core Spell that includes the Prime Spell payload.
Two governance paths are accommodated. The Sky Governance path applies to Prime Agents whose Root Edit Primitive is not yet operational; in this state, Prime Spell content is ratified through the Sky Core Atlas Edit Proposal process as specified in Atlas Edit Proposal Process For Prime Agents. The Independent Governance path applies to Prime Agents whose Root Edit Primitive is operational; in this state, Prime Spell content is ratified through the voting process defined in the Prime Agent's Root Edit Primitive. Any divergences between the governance paths are specified in the relevant sections.
The Prime Spell Process is organized into four (4) phases, one per week, specified in the subdocuments herein.
During week 0 of the Prime Spell Process, the Prime Agent's proposed Prime Spell content for the upcoming Executive Vote cycle is submitted, prioritized, and approved, as specified in the subdocuments herein.
The Prime Agent submits a Prime Spell Form to the Executive Process Liaison by Monday, 16:00 UTC of week 0. The Prime Spell Form initiates the Prime Spell Process for the upcoming Executive Vote cycle and specifies the proposed Prime Spell content. The Prime Agent must include the complexity score calculation for the proposed Prime Spell content in the Prime Spell Form.
The Executive Process Liaison reviews the submitted Prime Spell Form for completeness and clarity, and discusses possible Prime Spell content and potential blockers with the Prime Agent. The Executive Process Liaison must verify the Prime Agent's complexity score calculation. The Executive Process Liaison must deliver the items, including the verified complexity score, to the Core Council Tracker by Wednesday, 16:00 UTC of week 0.
After the items are delivered to the Core Council Tracker, the Core Council Risk Advisor conducts a pre-risk review of the proposed Prime Spell content. The pre-risk review identifies any preliminary risk concerns that should inform the Strategic Team's approval of Spell scope. The pre-risk review must be completed before the Strategic Team approval specified in Strategic Team Approves Spell Scope.
The Strategic Team reviews the items and approves the scope of Prime Agent content to be advanced through the Prime Spell Process for the upcoming Executive Vote cycle. The approval reflects the Strategic Team's assessment of business needs and strategic alignment with the Sky Ecosystem's broader objectives. Approval must be completed by end of Friday of week 0.
Following the Strategic Team's approval as specified in Strategic Team Approves Spell Scope, the Executive Process Liaison should communicate the approved scope to the Prime Agent and the Core Council Risk Advisor.
During week 1 of the Prime Spell Process, the scope of approved Prime Spell content is finalized through Forum publication, risk review, and Atlas Edit Proposal submission, as specified in the subdocuments herein.
Prior to publication of Forum posts as specified in Prime Agent Publishes Spell Actions On Sky Forum, the Prime Agent must complete an internal review of the draft posts by at least one member of the Prime Agent's team independent of the action's author. The Executive Process Liaison then reviews the draft posts and verifies that the internal review has been completed. For actions involving Allocations, the Executive Process Liaison must validate the destination deposit addresses using offchain systems.
Each proposed Prime Spell action must be included in a Forum post on the Sky Forum. Each Forum post must contain the Technical Scope, the Financial Risk Assessment, and, if relevant, a Technical Risk Assessment.
Under the Sky Governance path, the Forum posts must be published by Wednesday, 16:00 UTC of week 1.
Under the Independent Governance path, the Forum posts must be published by end of Friday of week 1.
The items included in the Prime Agent's Forum posts must undergo a financial risk assessment.
Under the Sky Governance path, the financial risk assessment is conducted by the Core Council Risk Advisor. The assessment must be posted on the Forum thread by Thursday, 16:00 UTC of week 1.
Under the Independent Governance path, the financial risk assessment is conducted by an independent risk assessor designated by the Prime Agent.
The Edit Proposal codifying the Prime Spell content for the cycle is drafted and submitted.
Under the Sky Governance path, Atlas Axis drafts the Atlas Edit Proposal codifying the Prime Spell content into the Atlas and shares it with the Prime Agent for sign-off by Thursday, 18:00 UTC of week 1. The signed-off Atlas Edit Proposal should then be submitted by Friday, 08:00 UTC of week 1, in accordance with Atlas Edit Weekly Cycle.
Under the Independent Governance path, the Operational Facilitator prepares and submits the Agent Artifact Edit Proposal codifying the Prime Spell content into the Prime Agent's Artifact, in accordance with the process defined in the Prime Agent's Root Edit Primitive.
During week 2 of the Prime Spell Process, the Edit Proposal is voted on, the Prime Spell payload is reviewed and delivered, and approved content is ratified into the Atlas or applicable Agent Artifact, as specified in the subdocuments herein.
By Monday, 08:00 UTC of week 2, the Prime Agent must deliver a signed-off Prime Spell Pull Request ready for external review. The internal review by the Prime Agent's team must be completed before this delivery.
The governance vote on the Edit Proposal is published on Monday, 16:00 UTC of week 2 and runs through Thursday of week 2.
Under the Sky Governance path, the Core Facilitator publishes the Governance Poll on the Sky voting portal, in accordance with Atlas Edit Weekly Cycle. Aligned Delegates vote on the Governance Poll.
Under the Independent Governance path, the Operational Facilitator initiates the vote in accordance with the voting process defined in the Prime Agent's Root Edit Primitive. The Prime Agent's token holders vote in accordance with that process.
The Prime Spell delivered in Prime Agent Delivers Signed-Off Prime Spell For Review must be externally reviewed during week 2, before the Prime Spell payload delivery specified in Prime Agent Delivers Prime Spell Payload. The reviewer must be either a member of a Core Spell Team that is not also serving as the Crafter for the Sky Core Spell of the same Executive Vote cycle, or an external reviewer engaged for the purpose.
The Sky Core GovOps meeting on Tuesday of week 2 includes review of the Prime Spell content alongside Sky Core content for the same Executive Vote cycle. The meeting itself is conducted as specified in GovOps Meeting. The Executive Process Liaison attends the meeting alongside the Core Facilitator, the Sky Core Spell Team, and the relevant Content Liaisons to represent the Prime Agent's interests in the cycle.
If the governance vote passes, the approved Edit Proposal must be incorporated into the Atlas or applicable Agent Artifact by Thursday, 23:59 UTC of week 2, establishing the provenance for the Prime Spell to be included in the Sky Core Executive Vote.
Under the Sky Governance path, the Core Facilitator and Atlas Axis incorporate the approved Atlas Edit Proposal into the Atlas.
Under the Independent Governance path, the Operational Facilitator incorporates the approved Agent Artifact Edit Proposal into the Prime Agent's Artifact.
By Friday, 16:00 UTC of week 2, the Prime Agent must deliver the final Prime Spell payload in the #govops Discord channel. The delivery must include the Prime Spell address, codehash, and execution type. The execution type must be specified in accordance with Execution Of Agent Spells.
By Friday, 16:00 UTC of week 2, the Core Facilitator must record the Prime Spell address, codehash, and execution type in the Executive Sheet for the corresponding Executive Vote. The Executive Process Liaison must confirm the recorded Prime Spell address against the address delivered by the Prime Agent in Prime Agent Delivers Prime Spell Payload.
During week 3 of the Prime Spell Process, a retrospective on the cycle is held and the Prime Spell payload is incorporated into the Sky Core Spell and published, as specified in the subdocuments herein.
A retrospective on the Prime Spell Process for the cycle is held on Monday of week 3, attended by the Executive Process Liaison, the Prime Agent, and the Prime Spell reviewer designated in Prime Spell Review. The Prime Spell reviewer scores the review for purposes of evolving the complexity scoring system. The Executive Process Liaison must follow up on any discrepancy between the Prime Agent's complexity score calculation and the reviewer's assessment.
The Sky Core Spell that includes the Prime Spell payload is crafted, reviewed, and published during week 3, as specified in Spell Crafter Crafts Spell Week 2 Monday (Step 7) through Spell Execution Process And Retro (Step 13) of the Sky Core Executive Process Breakdown.
Edit scope
2 edited documents
The Governance Point prepares the Executive Sheet by identifying items for potential inclusion. At this stage, all content and values are considered provisional. While the Governance Point prepares this preliminary plan for the content of the spellSpell, the final consensus regarding what to include is reached during the GovOps meeting with the Spell Team. The subdocuments herein explain how the Governance Point identifies these items. This preparatory phase ensures that content is outlined and organized in advance.
The process of determining which content to include in the Executive Sheet, as well as the timing of its inclusion, varies based on the nature of the items in question. Several factors must be carefully considered, including adherence to governance processes, addressing security concerns, and evaluating the urgency of the Sky Protocol. Every item included in the spellSpell poses a security risk to Sky.
Edit scope
14 edited documents
The Spell Crafter must ensure that the spellSpell is crafted and completed on Monday week 2.
In the Development Stage, the Spell Crafter writes the code for the spellSpell based on the contents of the Executive Sheet. The output of the Development Process is a Pull Request containing the code for the Spell that is ready for review. In performing the Development Stage, the Crafter takes the steps set forth in the checklists found here: https://github.com/sky-ecosystem/pe-checklists/blob/master/spell/spell-crafter-mainnet-workflow.md.
The Crafter must comply with a number of rules when carrying out their role and responsibilities in spellSpell development. These rules are generally aimed at maximizing the safety and security of the spellSpell and are set out in the subdocuments herein.
Before developing the current spellSpell, the designated Crafter must clean up the previous spellSpell code. Code cleanup includes the DssSpell.sol (spellSpell code), DssSpell.t.sol (spellSpell code tests) and config.sol(deployed spellSpell information) files. In this process of code cleanup, the Crafter must remove unused interfaces as well as spellSpell code and test code from the last spellSpell. If relevant, they must also clean up any dependency files from the previous spellSpell that are not being used for the current spellSpell.
The Crafter must use the Executive Sheet as their key reference document and source of truth while developing the spellSpell. While the Executive Document is the instruction document for the Executive Process, the Executive Sheet is available earlier which enables the Crafter to begin spellSpell development at an earlier stage.
The designated Crafter is the only person or entity permitted to commit GitHub code suggestions to the spellSpell. The Crafter can only commit suggestions that have been made by a designated Reviewer for the particular spellSpell. However, using GitHub suggestions is generally discouraged while developing the spellSpell.
In order to ensure that no malicious maintenance pull requests have been merged, the Crafter must check that the latest commit made to the "master" (or "main") branch of the spellSpell repository is the commit that merged the last spellSpell to master.
Before marking a spell’sSpell’s Pull Request as "ready for review", the Crafter must ensure that both continuous integration tests and locally run tests are all passing successfully. The only exception to this rule is when the continuous integration tests are broken at no fault of the Spell Team - due to a GitHub failure or otherwise - in which case the spellSpell can be marked as "ready for review" if locally run tests are passing. The Crafter must not remove or disable failing tests in order to bypass this rule.
The Crafter plays a key role in the process for identifying, analyzing, and resolving technical issues like bugs, mistakes, and exploits when they arise during the spellSpell development process. Other stakeholders, including the Spell Reviewer and Core FacilitatorsFacilitator, also play an important role. This process is set out in the subdocuments herein.
When a technical issue is encountered, the party discovering the issue (whether the Crafter, a Reviewer, or another party) must determine whether the issue is either a mistake, a bug, or an exploit. The issue should also be classified as either a result of collusion or a genuine accident. The Spell Team must notify the Core Facilitator of technical issues that require input or adjustments from outside the Spell Team. Note that if a Crafter makes an error in their original development of the spellSpell, but discovers their own mistake and corrects it before the Reviewers commence the review process, this should not be treated as a technical issue per this handling process.
Once a technical issue has been classified and evidence supporting its existence is collected, an entity needs to be designated as the handling party for resolving the issue. This party will typically be the Core FacilitatorsFacilitator. However, if there is a non-trivial chance that the Core FacilitatorsFacilitator will ignore or downplay the issue, another entity should serve as the handling party.
The Crafter or Reviewer, if they discovered the technical issue, should address or remedy the issue as necessary to resolve it. The handling party (typically the Core FacilitatorsFacilitator) must follow up to ensure that the technical issue has been resolved. If the issue poses a threat to the Sky Protocol - such as an exploit or instance of collusion - it should be followed up on as a matter of urgency by the handling party.
As a core member of the Spell Team, the Crafter must comply with the Spell Team Operational Principles throughout their involvement in the spellSpell development process. These principles apply to both spell crafting and spellSpell crafting and Spell reviewing processes, and have been included in the documentation of both. These principelsprinciples are set out in the subdocuments herein.
All existing Sky processes and patterns, whether pertaining to rules, processes, systems, smart contracts, or code, must be complied with. If regular operation is impossible due to a technical limitation or otherwise, it is permitted so long as it does not compromise the safety or security of the Sky Protocol in any way. New patterns developed in this way must prioritize the safety and security of the Sky Protocol over all other considerations and should be as similar to old patterns as possible. However, deviation from industry norms and best practices is encouraged so long as they are made in the interest of maximizing security. Any deviations by the Crafter or Reviewers must be communicated to the Core Facilitators.Facilitator.
Edit scope
2 edited documents
Every action that should be included in the spellSpell must be present in the Executive Sheet. Each executive action is populated in the Executive Sheet under a column and broken down into "input" actions and "derived" actions. An Input Action represents a high-level category, and a Derived Action breaks down the Input Action into specific, actionable steps or changes. Each action in the Executive Sheet, whether input or derived, must have sufficient provenance to support its presence during the spellSpell.
The text for both "input" and "derived" actions listed in the Executive Sheet should follow previous wording and structural patterns. There should be no deviation from existing patterns of wording or sentence structure used in the Executive Sheet unless it is absolutely required for the spellSpell process to be completed. The instructions should be specific and follow previous instructions in the archive.
Edit scope
2 edited documents
In the Google Sheet document, there is a tab named "spellSpell progress tracking". The Governance Point must:
1. Add a new column for the Executive Vote. The column should be added to the right in the document to make sure that the Executive Votes are sorted in chronological order.
2. Enter the Target Date.
The Governance Point must ensure that the progress for the spellSpell is updated accurately in the spellSpell progress tracker. When a step is completed, the Governance Point must write "done" in the spellSpell progress tracker column. This is an ongoing responsibility throughout the lifecycle of the Executive Vote to maintain real-time accuracy.
Edit scope
4 edited documents
The meeting, which is conducted by text, takes place on Discord in the #govops channel, 9 days before the Target Date. The Governance Point invites and leads the meeting. The Governance Point must make sure that the items specified in the subdocuments herein are processed at the meeting. The meeting takes place at 15.00 UTC. The Governance Point creates a separate thread in the #govops channel for every Executive Vote. The thread is named the target spellSpell date: "YYYY-MM-DD Executive Coordination".
The GovOps meeting includes various stakeholders. Governance Point, Technical Point, and Content Liaisons typically attend, whether sync or async.
The Executive Sheet serves as the basic reference for stakeholders. The decisions made by stakeholders will often result in real-time changes to the Executive Sheet.
The Governance Point lists the preliminary content in the Executive Sheet. Each item is discussed at the meeting. The review during the GovOps meeting primarily focuses on the technical aspects of the instructions in the Executive Sheet. The Technical Point often provides technical advice to the Governance Point during the GovOps meetings, including technical risk and other implications that the Governance Point may not otherwise be aware of. If the spellSpell includes complex code, the Technical Point may sometimes prepare technical documents to facilitate the process.
The Governance Point may have additional discussions with Ecosystem Actors in separate Discord channels.
Based on the review of requested and planned content, the teams must reach a consensus on which items to include in the spellSpell. In some cases, the Spell Crafter may request the removal of certain items if the spellSpell is deemed high risk, too big or contains novel code. Such removals typically affect non-critical items, such as internal payments. Content being removed from the Executive Sheet is added to the Executive Vote queue to be included in the next Executive Vote cycle.
Onboarding of sensitive modules is considered increasing the spellSpell's complexity in such a manner that the Spell Reviewers should only focus on this; therefore, non-crucial items should be removed from the Executive Sheet and included in the Executive Vote queue.
Based on the planned content of the spellSpell, the Governance Point must ask the Technical Point to confirm the values of the recurring checklist items. See Governance Point Includes Recurring Items In The Executive Sheet.
Edit scope
1 edited document
The Governance Point can leave comments in the designated columns "Reasoning URL" and "Authority URL". These comments typically provide instances of the ‘strong comment type’ of provenance and therefore authorize the execution of executive actions using the authority provided to the commenting party by the Atlas. The provenance URLs always correspond to comments in the spellSpell code.
Edit scope
1 edited document
The Governance Point is responsible for ensuring that the Executive Sheet is fully completed and accurate. This includes the following:
TODO tag.Edit scope
3 edited documents
The Executive Document contains both text content and metadata fields, which are essential for its functionality and clarity. These include:
The document uses different levels of Markdown headings to organize its content into distinct sections:
This structured approach ensures that the document is both easy to navigate and comprehensive.
This section provides a detailed breakdown of each item included in the proposal. It includes:
This section ensures that all actions are clearly explained and linked to their reasoning and authorization documents.
Edit scope
1 edited document
The Core Facilitator must create a summary that refers to every action included in the proposal. Under the Executive summary, the Core Facilitator must include the following details:
1. Office-Hours Modifier:
2. GSM Pause Delay:
3. Proposal Expiry:
Edit scope
1 edited document
The Reviewers play a key role in the process for identifying, analyzing and resolving technical issues like bugs, mistakes and exploits when they arise during the Spell development process. Other stakeholders, including the Spell Crafter and Core FacilitatorsFacilitator, also play an important role. The technical issue process is outlined here Process For Handling Technical Issues. All technical issues identified by Reviewers should follow the steps specified in this process
Edit scope
1 edited document
The use of Discord is not required during Spell verification, as it primarily serves as a platform for public communication between Core Facilitatorsthe Core Facilitator and members of the current Spell Team.
However, using Discord is highly recommended for Spell validators, as the communication history in the #new-Spells channel may provide valuable context or additional information for the validation process.
Edit scope
2 edited documents
When an issue has been reported by a Spell validator, the Core FacilitatorsFacilitator or the Spell Team who worked on the Spell areis likely to respond to the issue. The Spell validator must assume that the parties providing the answer are acting maliciously and lying to prevent the discovery of their attack.
The validator may only consider the issue as resolved once they are comfortable that the issue does not constitute a bug or attack that poses a threat to the Sky Protocol. Only the validator who raised the issue is permitted to consider an issue as resolved, and any unresolved issue will prevent the Spell from passing validation.
Publicly reporting issues found during Spell validation is the recommended method of issue reporting. Issues reported publicly may be reported to Core Facilitatorsthe Core Facilitator using the "#new-Spells" channel in the Sky Builder Discord Group. In cases of potentially malicious Core FacilitatorsIf the Core Facilitator may be acting maliciously, issues should be reported to Aligned Delegates and wider Sky Governance using the "#governance" channel in the Sky Builder Discord Group. In cases where this is not possible, posts made to the Sky Forum may be used; however, these should be used as a last resort as they will likely cause a slower response time.
Edit scope
2 edited documents
In addition to the SparkLend Freezer Mom contract defined in SparkLend Freezer Mom Exception, an external SparkLend Security Access Multisig has been established that allows for pausing and/or freezing SparkLend markets. The SparkLend Security Access Multisig can enable or disable the SparkLend Freezer Mom contract without the need for inclusion in a spellSpell through the standard Executive Vote process.
Each action executed by the multisig, including any function calls and their parameters, must be reported to the Sky community within a reasonable time frame through a post on the Sky Forum. Such actions include activating or disabling the pause or freeze function.
The list of instances justifying use of the multisig in the Target Document is not intended to be exhaustive. However, the Core Council must exercise due caution in reviewing and validating use of the multisig in edge cases, i.e., use of the multisig that falls outside of the examples provided in the Target Document. In such "edge cases," the Core Council must ensure that a postmortem is publicly published on the Sky Forum which justifies the use of the multisig. The Core Council should also consider proposing an edit to the Target Document so that the edge case is explicitly included in the examples provided in the Target Document.
Edit scope
1 edited document
Emergency Spells are expedited ad hoc spellsSpells that, while typically compliant with all customary quality-assurance processes, do not adhere to the normal spellSpell cadence. Emergency Spells solve the root issue of an emergency / urgent situation impacting the Protocol and are used when a rapid response time is needed. The Core Facilitator and Core GovOps are responsible for managing the use of Emergency Spells pursuant to Emergency Response Roles And Responsibilities and Known And Uncontentious Remedies.
Edit scope
5 edited documents
Sky Protocol uses circuit-breakers to mitigate undesired scenarios, which circuit-breakers are called MOM contracts. MOM contracts must first be triggered through a spellSpell, after which they bypass the GSM Pause Delay and can immediately act on the Protocol. See Exceptions.
In emergency scenarios, time is a scarce resource. Therefore, Standby Spells are used in validated emergency scenarios to trigger a MOM contract. In an emergency situation, spellSpell teams can then focus on crafting an ad hoc Emergency Spell to solve the root cause of an issue, if appropriate. Due to Standby Spells, it is no longer necessary in an emergency for spellSpell teams to spend time crafting and reviewing a spellSpell whose sole purpose is to trigger a mitigation of the issue, i.e., the MOM contract.
Standby Spells open new attack vectors that must be mitigated pursuant to ADs' Role In Standby Spells.
The currently available Standby Spells are defined in the subdocuments herein. The following list of Standby Spells is not exhaustive: that is, the Core Facilitator, in collaboration with the Emergency Response Group and spellSpell teams, has the discretion to develop and use a Standby Spell that is not listed in the subdocuments below. When that occurs, however, the Core Facilitator must ensure that the new Standby Spell is subsequently added to the subdocuments below.
This Standby Spell can be used in an emergency to disable a D3M integration. If a D3M partner is experiencing a problem such as a hack, this emergency spellSpell can be used to prevent abuse. While it cannot recover Dai already injected into the compromised protocol, the Emergency Spell can prevent additional exposure.
The subdocuments herein define currently available multi-collateral Standby Spells. Multi-collateral Standby Spell contracts are spellsSpells in themselves and are thus reusable; beyond the initial deployment of the contract, no further deployment is needed.
The subdocuments herein define currently available global Standby Spells. Global Standby Spell contracts are spellsSpells in themselves and are thus reusable; beyond the initial deployment of the contract, no further deployment is needed. Global Standby Spells differ from multi-collateral Standby Spells in that the former operates on the Protocol globally and not on some set of collaterals.
Edit scope
1 edited document
An Executive Vote (also "Executive") is a formalized governance proposal that requires on-chain voting. Through the Executive Vote mechanism, SKY holders steward Sky Governance by voting on Executive proposals that pertain to operations maintaining the Protocol. Executive Votes execute technical changes to the Sky Protocol.
The Executive Vote occurs approximately every two weeks. Its contents are often determined by weekly Governance Polls that pre-approve the inclusion of proposals in the Executive Vote. However, the Atlas can explicitly authorize proposals to go directly to an Executive Vote.
Note that the terms ‘Executive’ and ‘spell’‘Spell’ are distinct concepts.
The term ‘Executive’ or ‘Executive Vote’ is used in all instances where the formal governance vote is being referenced. The term ‘Executive Process’ refers to the end-to-end process of the development of an Executive Vote, in which Facilitators, spellSpell teams (also referred to collectively as the "Governance Security Engineering Team") and other recognized Ecosystem Actors participate.
The term ‘spell’‘Spell’ refers to the smart contract that executes the changes to the protocol approved by Sky Governance in an Executive Vote. Generally, when referring to spellSpell team operations and their technical outcome or product (including code base, code operations, code reviews and code quality), the term ‘spell’‘Spell’ will be used.
The term ‘spell‘Spell process’ refers to the end-to-end process of developing a spellSpell, a process in which the Core Facilitator and the current spellSpell team participate. The term ‘spell‘Spell development process’ is a subset of the ‘spell‘Spell process’ and pertains solely to the technical development of the spell by the current spellSpell by the current Spell team.
Edit scope
3 edited documents
Every Monday, the Operational Weekly Cycle begins. It implements standard recurring operational decisions, proposed in the form of polls.
Operational Weekly Cycle proposals ("proposals") can be proposed by Facilitators and recognized Ecosystem Actors. The proposals should be posted to the Sky Forum by Friday at 8:00 am UTC to ensure the Core Facilitator has sufficient time to prepare the needed polls for the following Monday.
After confirming that the proposer has the authority to request a poll, the Facilitator must post an explicit approval of the poll request as a reply to the proposer’s Forum thread. The Core Facilitator must then prepare and publish the Governance Poll.
The Operational Weekly Cycle polls run for three days.
The outcome of the polls determines the contents of the upcoming Executive Vote.
The Core Facilitator confirm the Executive Vote contents and deliver the Executive Sheet to the spell team. The spellSpell team. The Spell team prepares and reviews the Mainnet spell. The spellSpell. The Spell team deploys the Mainnet spellSpell; and then creates and reviews a Mainnet fork.
The Core Facilitator add the Executive Vote to the Voting Portal and communicate this to the Sky Ecosystem community. The Executive Vote has an expiration of thirty (30) days; if an Executive proposal does not pass within this timeframe, it expires and can no longer have any effect on the Sky Protocol.
The Executive Sheet refers to a Google Sheets document located at https://docs.google.com/spreadsheets/d/1w_z5WpqxzwreCcaveB2Ye1PP5B8QAHDglzyxKHG3CHw/edit?gid=1593813984#gid=1593813984. The Executive Sheet contains a list of content which is planned to be included in a given spellSpell. The Executive Sheet is prepared by the Core Facilitator.
Successfully polled changes to the Sky Protocol are included in an Executive Vote that is typically conducted within approximately 30 days of the poll passing. The exact timing is dependent on the decisions made by the Core Facilitator and the spellSpell teams.
Edit scope
3 edited documents
The Core Facilitator may create proposals using the Weekly Governance Cycle to enable them to fulfill their responsibilities.
The Core Facilitator is authorized to add housekeeping items in an Executive Vote pursuant to the procedure defined in Process for Adding Housekeeping Item In Executive Vote. The Core Facilitator can propose housekeeping items of their own accord; or, they can do so in consultation with the spellSpell teams.
Where housekeeping items are proposed by the spellSpell teams, the Core Facilitator must always conduct an independent assessment of the justification for, and security risks associated with, the housekeeping items. After the proposed housekeeping items have passed this independent assessment, the Core Facilitator may propose adding these items in an Executive Vote pursuant to the procedure defined in Process for Adding Housekeeping Item In Executive Vote.
Housekeeping items can be directly included in Executive Votes without a Governance Poll through the following process. The Core Facilitator must first create a post on the Sky Forum detailing the housekeeping items and the rationale for their inclusion. The Core Facilitator must request a confirmation of the technical accuracy of the housekeeping items from the technical Ecosystem Actor (or spellSpell team) who is leading spellSpell development for the pertinent Executive Vote. The Technical Ecosystem Actor (spellSpell team) must reply to the Forum Post confirming the accuracy of the housekeeping item.
Edit scope
8 edited documents
The Executive Vote occurs approximately every two weeks, although this cadence can vary based on decisions made by the Core Facilitator and the current spellSpell team.
The element "current spellSpell team" refers to the group of people who are presently working on a given spellSpell. Members of the spellSpell team may perform a crafter role or a reviewer role. The "current spellSpell team" does not include the "spellSpell roster", which latter is defined as the group of people from which spellSpell team members for a given spellSpell are selected.
A scheduled Executive Vote can be postponed if deemed necessary by the Core Facilitator and the current spellSpell team.
The element "current spellSpell team" refers to the group of people who are presently working on a given spellSpell. Members of the spellSpell team may perform a crafter role or a reviewer role. The "current spellSpell team" does not include the "spellSpell roster", which latter is defined as the group of people from which spellSpell team members for a given spellSpell are selected.
Additional Executive Votes outside the regular schedule may be introduced if deemed necessary by the Core Facilitator and the current spellSpell team.
The element "current spellSpell team" refers to the group of people who are presently working on a given spellSpell. Members of the spellSpell team may perform a crafter role or a reviewer role. The "current spellSpell team" does not include the "spellSpell roster", which latter is defined as the group of people from which spellSpell team members for a given spellSpell are selected.
If there are no substantive changes due to be made to the Sky Protocol, the Core Facilitator, in conjunction with the spellSpell teams, may opt not to publish an Executive Vote. This decision should be announced and justified on the Sky Forum.
The element "spellSpell teams" indicates that the entire spellSpell roster can participate in the decision described in the Target Document. The spellSpell roster is defined as all spellSpell team members authorized to perform spell crafting and spellSpell crafting and Spell reviewing services for Sky Core.
Edit scope
4 edited documents
After the Atlas Edit Proposal is triggered, the Core Facilitator must verify that the Atlas Edit Proposal follows the template specified in Atlas Edit Proposal Template.
The Core Facilitator must also verify that the AEP has been submitted to the Atlas Github repository with a Pull Request by the AEP Author. Alternatively, the AEP author can request the Core Facilitator to create the Pull Request for them.
If the AEP is successfully verified, the Core Facilitator must
The Core Facilitator is required to review all Atlas Edit Proposals (AEPs) submitted for Formal Submission to determine whether they are misaligned.
If an AEP has passed the Core Facilitators’Facilitator’s review, the Core Facilitator must update the status of the AEP to "Formal Submission."
Once an Atlas Edit Proposal has been formally submitted and has passed the Core Facilitators’Facilitator’s review, the AEP enters the Monthly Governance Cycle.
Edit scope
1 edited document
Active Data with the "Alignment Conserver Changes" Update Process pertains to the Core Facilitators’Facilitator’s maintenance of the Atlas’ official listing of some subset of Alignment Conservers.
The triggers of such updates can include, but are not limited to, recognizing a new Alignment Conserver; offboarding an Alignment Conserver at the request of that Alignment Conserver; adding an Alignment Conserver to the list of ACs who have received a formal warning; or derecognizing an Alignment Conserver for misalignment.
The Core Facilitator can modify the pertinent Active Data documents to reflect such changes immediately; they are not required to create a post on Sky Forum.
Edit scope
6 edited documents
A SKY holder who believes that an Agent Artifact conflicts with the Sky Core Atlas may escalate their concern to Sky Core Facilitatorsthe Core Facilitator via posting a "Notice of Potential Conflict" on the Sky Forum. Upon receipt of such notice, the protocol specified in the documents herein must be initiated.
Once a Notice of Potential Conflict is posted on the Sky Forum, Sky Core Facilitatorsthe Core Facilitator must review the merits of the claim. The Sky Core Facilitators haveCore Facilitator has the discretion to conduct an investigation and collect more information as needed to assess the potential conflict.
Following their review of the Notice of Potential Conflict, the Sky Core FacilitatorsCore Facilitator must issue a formal determination about whether a conflict exists. If the Sky Core Facilitators determineCore Facilitator determines that a conflict exists, they must issue an "Intent to Suspend" notice relating to the particular part of the Agent Artifact they consider to be in conflict. If the Sky Core Facilitators determineCore Facilitator determines that no conflict exists, they must post this determination and their reasoning in response to the Notice of Potential Conflict on the Sky Forum.
Once the Sky Core Facilitators issueCore Facilitator issues an Intent to Suspend notice relating to the relevant conflicting portion of an Agent Artifact, the relevant Prime Agent or Prime Agent token holders have fourteen (14) days to amend or clarify the Artifact provision in question in order to ameliorate the conflict. Once the fourteen days elapse, the Sky Core FacilitatorsCore Facilitator must determine whether the conflict continues to exist. If the Sky Core Facilitators determineCore Facilitator determines that the conflict is not resolved, the relevant portion of the Agent Artifact is formally invalidated.
If Sky Core immediately suspends a particular provision or function in an Agent Artifact, that provision or function will remain inactive until either the emergency situation is resolved or a formal review by Sky Core Facilitatorsthe Core Facilitator concludes that there is no issue with the Agent Artifact.
Any decision by Sky Core to use its emergency suspension discretion must be followed by a formal review process by Sky Core Facilitatorsthe Core Facilitator as to the particular risks or issues with the Agent Artifact in question. The Sky Core FacilitatorsCore Facilitator must ensure that this review process is timely and clearly communicated to the affected Prime Agent.
Edit scope
4 edited documents
Initiation of the Agent Termination Protocol requires the token holders of an Agent to follow the special voting requirements prescribed in the Root Edit Primitive for the Agent’s termination. Typically, these special voting requirements include a supermajority (two-thirds of votes) in support of the decision to terminate, as well as a high minimum quorum (20% of all tokens must participate in the vote) and a lengthy voting period (two weeks) in order to provide the Agent’s token holders with sufficient notice. In addition, the Sky Core Facilitators must issue a notice in the Sky Forum publicizing, as specified in Agent Termination Process. These requirements include a minimum voting period, a minimum quorum, a supermajority approval threshold, and advance notice of the Agent’s proposed termination and subsequent votethe subsequent Agent vote issued in the Sky Forum by the Operational Facilitator.
If the Agent Termination Protocol is activated, the Agent’s designated Executor Agent is tasked with ensuring the smooth and seamless wind-down of all of the Agent’s activities and functions. The Executor Agent must ensure that the cessation of any functionality is clearly communicated and signaled to users or other stakeholders, with a wind-down period calibrated to enable a smooth transition. Sky Core Facilitators must oversee the Agent Termination Process and ensure that the Executor Agent is executing the wind-down of the Prime Agent’s business activities in a manner aligned with Sky Core and end users’ interests. The Executor Agent should also, to the extent practicable, ensure that the assets or holdings of the Prime Agent are proportionately disbursed to Prime Agent The Core Facilitator must oversee the Agent Termination Process and ensure that the Executor Agent is executing the wind-down of the Prime Agent’s business activities in a manner aligned with Sky Core and end users’ interests. The Executor Agent should also, to the extent practicable, ensure that the assets or holdings of the Prime Agent are proportionately disbursed to Prime Agent token holders.
Once the Executor Agent has ensured that all operational activities and functions of the Prime Agent have been wound down, the Sky Core FacilitatorsOperational Facilitator must issue a notice in the Sky Forum indicating the formal termination of the Agent. Any residual assets or holdings of the Prime Agents, that could not be disbursed to Prime Agent token holders, revert to ownership by Sky Core.
In the event of any dispute between the Agent or Agent token holders, and the designated Executor Agent carrying out the Agent Termination Process, the Sky Core FacilitatorsCore Facilitator must mediate. If there are operational disagreements between an Agent’s Founder or Agent token holders and the Executor Agent, the Sky Core Facilitators haveCore Facilitator has discretion to direct the Executor Agent to take a particular action as consistent with the Sky Core Atlas and the relevant Agent Artifact.
Edit scope
6 new documents
The Agent Termination Process, as specified in Agent Termination Protocol, deviates from the general Artifact Edit Process and follows the special voting process specified in the documents herein.
The Root Edit Primitive must specify a voting period of at least 14 days.
The Root Edit Primitive must specify a minimum quorum of at least 20% of outstanding tokens.
The Root Edit Primitive must specify a supermajority approval threshold where at least two-thirds (2/3) of votes cast are in favor.
The Root Edit Primitive must require the Operational Facilitator to issue advance notice of the Agent's proposed termination and the subsequent Agent vote in the Sky Forum.
Existing Prime Agents whose Root Edit Primitive does not already incorporate the requirements specified in Agent Termination Process must update their Agent Artifact to include them by September 1, 2026.
Edit scope
1 new document
Pending activation of the USDS Staking Rewards specified in Step 3: Smart Burn Engine, no Step 4 Capital is allocated to SKY Staking Rewards. Instead, SKY Staking Rewards are funded from SKY token reserves held by the Protocol Treasury via the Vesting Stream Contract specified in Vesting Stream Contract, distributed at a rate equivalent to fifty percent (50%) of Step 2 Capital from the prior Monthly Settlement Cycle. The rate is determined by the Core Facilitator in consultation with the Core Council Risk Advisor following each Monthly Settlement Cycle, using the prior Monthly Settlement Cycle's Step 2 Capital and the price of SKY, and is implemented through an Executive Vote.
Edit scope
1 edited document
The Genesis Capital Allocation will be used to fund the Core Council Executor Agent 1; the incubating Operational Executor Agents; and broader Core operational expenses, including technical infrastructure, spellSpell crafting, risk work, and spellSpell audits.
Edit scope
1 edited document
PoEs rely on a governance decision that was ratified by an Executive Vote.
The Resilience Technical Committee Member must identify this governance decision by verifying the spellSpell that enacted the Executive Vote ratifying the respective governance decision. This spellSpell contains the hash of the respective Executive Vote. Exceptional circumstances where no direct governance decision is available or difficult to assert will be handled case by case.
The Resilience Technical Committee Member will confirm the onboarding decision via an encrypted message to the Applicant.
Edit scope
3 edited documents
Multisig signers may be rotated as operational or security requirements evolve. All signer rotations must be communicated to Core GovOpsthe Protocol Security Workstream Lead by the Multisig Administrator, accompanied by clear documentation describing the reason for the change, the outgoing signer, and the incoming signer. Core GovOps must update the Multisig Registry to reflect the changes.
Any change to Multisig signer composition must be promptly communicated to Core GovOpsthe Protocol Security Workstream Lead by the Multisig Administrator. Core GovOps must update the Multisig Registry to ensure it includes, including all updated signer addresses.
Signer rotations must not reduce the total number of signers or decrease the signing threshold unless the Multisig Administrator provides a clear operational or security justification that is submitted to and approved by Core GovOpsthe Protocol Security Workstream Lead.
Edit scope
1 edited document
In the event that less extreme measures are not adequate to address the capital shortfall, Core GovOps may seek to put the Prime Agent into conservatorship, in which case Sky Core Facilitators takethe Sky Core Facilitator takes direct control of the Prime Agent to maximize value for Sky and other Prime Agent stakeholders. Seeking to put a Prime Agent into conservatorship requires immediate escalation to Sky Core Governance and requires an expedited Executive Vote as specified in Known And Uncontentious Remedies.
Edit scope
1 edited document
Once a matter has been escalated to Sky Governance, the Sky Core FacilitatorsFacilitator may request any information they deem necessary from Core GovOps, Operational GovOps, and the Prime Agent. Sky Governance then acts through a Governance Poll to determine its resolution of the matter.
Edit scope
2 edited documents
Until the Treasury Management Function (TMF) is fully implementedPending activation of the USDS Staking Rewards specified in Step 3: Smart Burn Engine, SKY rewards for SKY stakers will be temporarilyare funded by SKY from the Protocol Treasury asat the rate specified in Short Term SKY Staking Rewards Rate and through the implementation specified in Implementation; this interim mechanism will be discontinued once the TMF becomes fullyUSDS Staking Rewards become operational.
The Core Facilitator, in consultation with the Core Council Risk Advisor, may modify the parameters of the vesting stream to achieve the target reward rate consistent with Step 3: Smart Burn Engineas specified in Short Term SKY Staking Rewards Rate. Such modifications can be effected directly via an Executive Vote, without a prior Governance Poll.
Edit scope
1 edited document
The function to brigdebridge USDS and sUSDS is currently actioned by an Executive Vote by Sky Governance. This process will be managed by the operator of the Spark Liquidity Layer in the future.
Edit scope
1 edited document
Each month, immediately following Spark’s monthly settlement with Sky, the Current SubDAO Proxy Value with be calculated based on the definition in Current SubDAO Proxy Value, and the Target SubDAO Proxy Value based on the evaluation method in Evaluation Method. If the Current SubDAO Proxy Value is greater than the Target SubDAO Proxy Value, this excess SubDAO Proxy Value is multiplied by the Standard Buyback Rate parameter up to the Enhanced Buyback Threshold, and then by the Enhanced Buyback Rate for any amount in excess of the Enhanced Buyback Threshold. The buyback amount for the month is set as the sum of the two values of the standard and enhanced buybacks.
The next available Spark proxy spellSpell will include a transfer of this calculated buyback amount to the designated Buyback Executor. After using the transferred funds to purchase SPK, the Buyback Executor will transfer all accrued SPK to the Spark SubDAO Proxy.
Edit scope
1 edited document
Modification of the signers of the Freezer Multisig must be approved through an Atlas Edit Proposal.
The only exceptions to this are if: 1) a signer self-reports a loss of access to their private key due to any reason; or 2) a signer explicitly expresses their wish to be removed as a signer. In both cases, the signer is required to communicate the loss of access to their private key, or the wish to be removed as a signer, in the form of a public Sky Forum post. The specific signer should be replaced as soon as possible.
Any changes to the Multisig signers that do not fall within the two exceptions listed above, or that have not been ratified by Sky Governance, should be questioned immediately and treated as malicious. Where malicious activity is suspected, the FacilitatorsCore Facilitator must prepare an expedited Executive Vote so that Sky Governance can vote on removing external security access from the Multisig.
Edit scope
1 edited document
Sky Core Facilitators currently ownThe Sky Core Facilitator currently owns the process for modifying the parameters of the Lite PSM, which process is defined in the Sky Core Atlas. This process is currently being transitioned over to Grove.
Edit scope
1 new document
This Instance's associated Instance Configuration Document is located at 1inch Instance Configuration Document.
Edit scope
16 new documents
The documents herein contain the Instance Configuration Document for the 1inch Distribution Reward Primitive Instance.
The documents herein define the parameters of the 1inch Instance of the Distribution Reward Primitive.
4011.
This Instance uses the Tracking Methodology specified in Ethereum Mainnet General Tracking Methodology.
The documents herein define the custom parameters of the 1inch Instance of the Distribution Reward Primitive, if any.
The documents herein define the process for the ongoing management of the 1inch Instance of the Distribution Reward Primitive.
This document defines the protocol for routine ongoing management of the 1inch Instance. This Instance inherits the base class of operational logic defined in Routine Protocol, subject to the qualifications specified in Near-Term Process.
Modifications to the base operational logic automatically propagate to this Instance. In future iterations of the Keel Artifact, a version of the full process definition customized to Keel will be included herein.
The Prime Agent may define instance-specific customization of the routine protocol to extend the baseline functionality defined in the Sky Core Atlas. This can include custom routines or processes layered on top of the inherited Sky Core logic. Any extensions must remain fully aligned with the requirements specified in the Sky Core Atlas. This document defines those customizations, if any.
[No customization presently.]
The documents herein define the protocol for non-routine ongoing management of the 1inch Instance of this Distribution Reward Primitive.
The documents herein define the protocol for handling emergency situations in the ongoing management of the 1inch Instance of this Distribution Reward Primitive.
The documents herein contain data relevant to the 1inch Instance of the Distribution Reward Primitive.
The materials associated with initial planning of the Invocation of this Instance are contained herein.
The materials associated with Operational GovOps Review during the Invocation of this Instance are contained herein.
The materials associated with preparing the Artifact Edit Proposal during the Invocation of this Instance are contained herein.
The Distribution Reward payments for the 1inch Instance of the Distribution Reward Primitive are defined as Active Data.
The Active Data is updated as follows:
The Distribution Reward Payments are:
Edit scope
1 edited document
The Pioneer Incentive Pool for this Instance is governed by the terms specified in Pioneer Incentive Pool and Ecosystem Accord 3: Sky And Keel.
Edit scope
1 edited document
Modification of the signers of the Freezer Multisig must be approved through an Atlas Edit Proposal.
The only exceptions to this are if: 1) a signer self-reports a loss of access to their private key due to any reason; or 2) a signer explicitly expresses their wish to be removed as a signer. In both cases, the signer is required to communicate the loss of access to their private key, or the wish to be removed as a signer, in the form of a public Sky Forum post. The specific signer should be replaced as soon as possible.
Any changes to the Multisig signers that do not fall within the two exceptions listed above, or that have not been ratified by Sky Governance, should be questioned immediately and treated as malicious. Where malicious activity is suspected, the FacilitatorsCore Facilitator must prepare an expedited Executive Vote so that Sky Governance can vote on removing external security access from the Multisig.
Edit scope
1 edited document
Modification of the signers of the Freezer Multisig must be approved through an Atlas Edit Proposal.
The only exceptions to this are if: 1) a signer self-reports a loss of access to their private key due to any reason; or 2) a signer explicitly expresses their wish to be removed as a signer. In both cases, the signer is required to communicate the loss of access to their private key, or the wish to be removed as a signer, in the form of a public Sky Forum post. The specific signer should be replaced as soon as possible.
Any changes to the Multisig signers that do not fall within the two exceptions listed above, or that have not been ratified by Sky Governance, should be questioned immediately and treated as malicious. Where malicious activity is suspected, the FacilitatorsCore Facilitator must prepare an expedited Executive Vote so that Sky Governance can vote on removing external security access from the Multisig.
Edit scope
5 edited documents
The Freezer Multisig has the FREEZER_ROLE as defined in Freezer Role and is controlled by Obex.
The Freezer Multisig currently has a 2/42/5 signing requirement.
The signers of the Freezer Multisig are four (4three (3) addresses controlled by Operational GovOps Soter Labs, one (1) address controlled by Operational Facilitator Redline Facilitation Group, and one (1) address controlled by Obex.
The usage standards for the Freezer Multisig will be specified in a future iteration of the Obex Artifactsigners of the Freezer Multisig should exercise their authority to freeze the Obex Liquidity Layer in the event that Obex is not complying with rules regarding Risk Capital or Asset Liability Management, or in the event of another emergency.
Each action executed by the Freezer Multisig, including any function calls and their parameters, must be reported to the Sky community within a reasonable time frame through a post on the Sky Forum.
The modification of signers for the Freezer Multisig will be specified in a future iteration of the Obex ArtifactModification of the signers of the Freezer Multisig must be approved through an Atlas Edit Proposal.
The only exceptions to this are if: 1) a signer self-reports a loss of access to their private key due to any reason; or 2) a signer explicitly expresses their wish to be removed as a signer. In both cases, the signer is required to communicate the loss of access to their private key, or the wish to be removed as a signer, in the form of a public Sky Forum post. The specific signer should be replaced as soon as possible.
Any changes to the Multisig signers that do not fall within the two exceptions listed above, or that have not been ratified by Sky Governance, should be questioned immediately and treated as malicious. Where malicious activity is suspected, the Core Facilitator must prepare an expedited Executive Vote so that Sky Governance can vote on removing external security access from the Multisig.
Edit scope
1 edited document
Modification of the signers of the Freezer Multisig must be approved through an Atlas Edit Proposal.
The only exceptions to this are if: 1) a signer self-reports a loss of access to their private key due to any reason; or 2) a signer explicitly expresses their wish to be removed as a signer. In both cases, the signer is required to communicate the loss of access to their private key, or the wish to be removed as a signer, in the form of a public Sky Forum post. The specific signer should be replaced as soon as possible.
Any changes to the Multisig signers that do not fall within the two exceptions listed above, or that have not been ratified by Sky Governance, should be questioned immediately and treated as malicious. Where malicious activity is suspected, the FacilitatorsCore Facilitator must prepare an expedited Executive Vote so that Sky Governance can vote on removing external security access from the Multisig.
Edit scope
1 edited document
This document contains a Directory of all prospective Instances of the Allocation System Primitive whose Invocation is currently in progress. Invocations that are completed successfully are moved to Active Instances Directory, whereas failed Invocations are Archived in Hub Data RepositoryHub Data Repository.
These documents had their identifier changed without modifying their content. Listed for audit; not shown in the Document Changes section above.