[BIP-707] Kill Shezmu Gauges

PR with Payload

Motivation

On Friday the 20th of September the Shezmu protocol was hacked and shezUSD was drained by a collateral minting exploit allowing the hacker to borrow an arbitrary amount of shezUSD. As a result shezETH trading was paused by the Emergency SubDAO.

Given both tokens have been victims of exploits we propose to kill the corresponding gauges:

Technical Specification

The DAO Multisig 0x10A19e7eE7d7F8a52822f6817de8ea18204F2e4f will interact with the AuthorizerAdaptorEntrypoint at 0xf5dECDB1f3d1ee384908Fbe16D2F0348AE43a9eA and call performAction using 0xab8f0945 for the data(bytes) argument and 0xa71adac76a2e34f8f988fa6992e3bdad08d92c01 as well as 0xb002073210698b0852e34da6a5e432a04d299205 as the root gauge addresses for the sDAI:ShezUSD and ShezETH:wstETH pools.

1 Like

https://snapshot.org/#/balancer.eth/proposal/0x3d1caafd9fbc17a504dcc2ea7e358ffcaac8a705d2cd332f45051d83669091cf

1 Like

payload was execd from the emergency subdao msig to speed up execution time

payload adjustment: [BIP-707] Kill Shezmu Gauges by Zen-Maxi · Pull Request #1381 · BalancerMaxis/multisig-ops · GitHub

tx: Ethereum Transaction Hash (Txhash) Details | Etherscan

2 Likes