Prerequisites: You must be the registry moderator or part of the DAO multisig.
What You’ll Do
- Find pending requests
- Review the protocol and contracts
- Check for copycat contracts
- Approve or reject the request
Step 1: Monitor for New Requests
Watch forAgreementStateChanged events with ATTACK_REQUESTED state:
Step 2: Get Agreement Details
Fetch the agreement information:You now have all the information needed to evaluate the request.
Step 3: Review Checklist
Go through this checklist:1. Is this a legitimate new deployment?
1. Is this a legitimate new deployment?
- Was it deployed via BattleChainDeployer?
- Does the protocol have a web presence, social accounts, audit reports?
- Are the contact details valid?
2. Is it NOT a mainnet copycat?
2. Is it NOT a mainnet copycat?
This is the most important check.
- Compare bytecode to known mainnet contracts
- Search for similar protocol names on other chains
- Check if the same contracts exist elsewhere with TVL
3. Are bounty terms reasonable?
3. Are bounty terms reasonable?
- Is the bounty percentage in normal range (5-15%)?
- Is the cap appropriate for the expected TVL?
- Are identity requirements clear?
4. Is the scope clearly defined?
4. Is the scope clearly defined?
- Are all necessary contracts included?
- Is the child contract scope appropriate?
- Is the recovery address a secure multisig?
Step 4: Make Your Decision
If Everything Looks Good: Approve
- Changes state to
UNDER_ATTACK - Enables Safe Harbor protection
- Allows whitehats to attack
If There Are Issues: Reject
- Returns state to
NOT_DEPLOYED - Clears contract mappings
- Protocol can resubmit with fixes
You’ve completed your first review! The protocol will see the state change via events.
Step 5: Document Your Decision
Record:- Agreement address reviewed
- Contracts in scope
- Checks performed
- Decision rationale
- Any concerns noted