This proposal seeks BalancerDAO’s approval for updates, new actions, and strategies related to the permissions policy governing the newly launched karpatkey-managed treasury on Gnosis Chain. These changes are part of a broader effort to optimise the DAO’s treasury, with the goal of enhancing its performance, flexibility, and diversification.
The proposed new permissions focus on strategies involving sDAI on Gnosis Chain and new vaults to stake GNO on Stakewise V3.
Motivation
Treasury management strategies must adapt to changing market conditions and protocol updates, including migrations and the launch of new pools. Protocols and pools that were previously deemed too immature or risky for BalancerDAO may become viable as they demonstrate reliability over time. This proposal seeks to incorporate these updated strategies into the current Permissions Policy.
Changes to the Permissions Policy
This proposal outlines the following modifications to the permissions policy:
sDAI on GC
Bridge DAI and GNO, Mainnet <> GC, two ways, in Gnosis Bridge.
this could have to do with the fact that it is upgradable, although the other stakewise vault do not have this issue. this upgradability potentially also jeopardises the value of scoping these permissions; an upgrade could simply replace the logic. note: no audit or review done from our side on any of the stakewise products
inconsistent cowswap token permutations
it is completely unclear to my why the cowswap token combinations are set up the way they are set up here; eg why sell usdt for sdai but not for gno? why the need to swap gno for gno?
that being said, it is good to see the more flexible unsign permissions (no scoping at all)
inconsistent cowswap token permutations
The goal is to set up preliminary swaps that allow for an efficient exit from a token exposure. This means that if we choose to reduce or eliminate exposure to a token, we can do so quickly and cost-effectively by moving into a similar asset class (sDAI <> Stables & GNO <> WETH). This is also subject to future PUR’s that add swap permissions on top of these ones.