Skip to content

Planning & Classification

Engineer/DeveloperSecurity SpecialistMultisig Security

Authored by:

Isaac Patka
Isaac Patka
SEAL | Shield3
Geoffrey Arone
Geoffrey Arone
Shield3
Louis Marquenet
Louis Marquenet
Opsek
Pablo Sabbatella
Pablo Sabbatella
SEAL | Opsek
Dickson Wu
Dickson Wu
SEAL

Reviewed by:

Piña
Piña
Coinspect
engn33r
engn33r

Before setting up a new multisig, take time to properly assess its role and requirements. This planning phase will guide all subsequent configuration decisions and help ensure appropriate security measures.

Before You Start

Define Purpose and Scope

Document the multisig's intended use:

  • Primary function - What will this multisig do?
  • Asset types and amounts - What will it control?
  • Operational frequency - How often will it be used?
  • Decision timeline - How quickly must it respond?
  • Integration points - What systems will it interact with?

Assess Constraints and Recovery

Consider limiting factors that affect risk:

  • Smart contract constraints - What technical limits reduce risk?
  • Governance recovery - Can governance override or recover funds?
  • Operational limits - Are there built-in spending or parameter limits?
  • Backup mechanisms - What happens if this multisig fails?

Identify Stakeholders

Determine who should be involved:

  • Required expertise - What knowledge is needed for decisions?
  • Geographic distribution - Do you need global coverage?
  • External signers - Should independent parties be involved?
  • Backup signers - Who can step in if primary signers are unavailable?

Classification Process

Use this dual classification system to determine appropriate security measures. These classifications are guidance to help you think through risk levels - they inform threshold selection, signer requirements, and operational procedures in later sections.

Step 1: Impact Assessment

What happens if this multisig is compromised or fails?

Financial Exposure:

  • Direct funds controlled by the multisig
  • Indirect exposure through protocol impacts
  • Maximum potential loss in worst-case scenario

Protocol Impact:

  • Can the protocol function without this multisig?
  • How difficult would recovery be?
  • Are there alternative execution paths?

Reputational Risk:

  • How visible is this multisig to the community?
  • What would compromise mean for the protocol's reputation?
  • Are there regulatory or compliance considerations?

Impact Classification

LevelFinancial ExposureProtocol ImpactReputational Risk
Low<$100k direct exposureMinimal disruption, alternative paths existLimited scope impact
Medium$100k - $1M exposureSignificant operational delays, workarounds availableModerate reputational concern
High$1M - $10M exposureMajor protocol disruption, difficult recoverySerious reputational damage
Critical>$10M exposureProtocol-wide failure, catastrophic impactSevere reputational damage

Step 2: Operational Assessment

How quickly and under what conditions must this multisig respond?

Response Time Requirements:

  • How quickly must decisions be made?
  • What are the consequences of delays?
  • Are there market or competitive timing factors?

Decision Context:

  • Are operations routine and predictable?
  • Do market conditions affect timing?
  • Is this primarily for emergency response?

Coordination Complexity:

  • How many parties must coordinate?
  • Are signers distributed globally?
  • What communication is required?

Operational Classification

TypeResponse TimeDecision ContextVerification Level
Routine24-48 hoursStandard procedures, predictable operationsFull verification protocols
Time-Sensitive2-12 hoursMarket conditions, protocol needsStreamlined but thorough
Emergency<2 hoursCrisis response, preventing immediate damageMinimal delays, risk-appropriate

Step 3: Classification Matrix

Combine your impact and operational assessments. Below are some example configurations.

Use CaseImpactOperationalStandard Threshold
Emergency FreezeCriticalEmergency2/4
Protocol ParametersHighRoutine4/7 (higher for upgrades, consider 7/9+)
Capital AllocationHighTime-Sensitive3/5
Treasury - LargeHighRoutine4/7
Treasury - SmallMediumRoutine3/5
Constrained DeFiMediumTime-Sensitive2/3

Step 4: Document Your Decision

Record your classification decision in the Registration template.

Important Notes

⚠️ When between classifications: Always err toward higher security requirements. Classifications can be relaxed with proper justification, but security incidents cannot be undone.

This classification will guide your threshold selection ([Thresholds & Configuration]), signer requirements, and operational procedures throughout the rest of the documentation.

Next Steps

After completing classification, proceed to:

  1. Setup & Configuration - Deploy your multisig
  2. Registration & Documentation - Document your setup