[BIP-151] Kill Vulnerable CSP Pool Gauges

Motivation:

Due to the recent vulnerability disclosure regarding several pools, liquidity has been mostly removed from these pools and their gauges have been rendered obsolete. The security risk will be addressed by the responsible teams and in due time the pools will be deployed from adjusted factories, in which case new gauges can be deployed and voted on by governance to restore these initiatives. For the time being, there is no sense in maintaining emissions to pools which are not secure for LPs to participate in.

Specification:

The following pools have active gauges and are affected by the vulnerability mentioned above. These pool’s gauges will be killed by the DAO multisig to conserve BAL emissions and decrease likelihood of LP participation in unsafe pools. The pool’s affected and their gauge addresses to be killed are as follows:

Ethereum (1) DOLA/bb-a-USD

  • Pool Address: 0x5b3240B6BE3E7487d61cd1AFdFC7Fe4Fa1D81e64

  • Gauge Address: 0x610f1569045041Af6212be048Bc43e8DC6a07b55

Polygon (137) bb-am-USD/miMATIC

  • Pool Address: 0xB54b2125b711cD183EDD3DD09433439D53961652

  • Gauge Address: 0xa9c6045636EAaA81836A874964Dd3Aa6486b0913

Optimism (420) Smell’s Like Spartan Spirit - bb-rf-aUSD-asUSD

  • Pool Address: 0x479A7d1fcDD71ce0C2ED3184bfbe9d23B92E8337

  • Gauge Address: 0x8F5F5b412dA3cB958c4d26444D9FA7ED11fD3F27

This will total 3 transactions to be executed, for each of which the following will occur to the gauge addresses outline above.

If approved, the DAO Multisig 0x10A19e7eE7d7F8a52822f6817de8ea18204F2e4f will interact with the AuthorizerAdaptor at 0x8F42aDBbA1B16EaAE3BB5754915E0D06059aDd75 and call performAction 3 times using 0xab8f0945 for the data(bytes) the target target(address) set to each of the 3 gauge addresses listed above.

3 Likes
1 Like

https://snapshot.org/#/balancer.eth/proposal/0x23f56359f272e0d2883cd9adb32a85f6def1962e7c6b515e054d9dcb8910fc66