Bypass Mechanism
Bypass Mechanism Purpose
The bypass functionality enables you to execute transactions that don't meet the normal Venn Guard validation requirements when:
Emergency situations require actions that don't conform to standard rules
Technical issues prevent normal transaction patterns
Unanticipated scenarios arise that were unknown during the initial guard setup
How It Works
The bypass mechanism uses a timelock approach:
Safe owners propose and sign a transaction
A bypass request is submitted with signatures meeting the Safe threshold
After a waiting period (set once when the guard is deployed and configurable for up to 7 days), the transaction can be executed
This provides a security balance - allowing flexibility while preventing the immediate execution of potentially high-risk transactions.
Select a Bypass Path
Technical Details
The bypass mechanism works through these key processes:
Transaction Identification The guard calculates a unique hash for each transaction based on its parameters
Bypass Registry Stores the timestamp when a bypass was initiated for each transaction hash
Time Verification During transaction execution, the guard checks if:
The transaction has a registered bypass request
The required wait time has elapsed since the bypass was initiated
Security Considerations
The bypass mechanism requires signatures meeting the Safe's threshold
The mandatory waiting period provides time to detect and react to unauthorized bypass attempts
Safe owners should be notified when bypass requests are submitted
Monitor bypass requests carefully - they circumvent normal security controls
Consider setting a longer wait time for higher-value Safes
Last updated
Was this helpful?