EXECUTED
Ended May 23 at 4:50 PM UTC

[TPP-3] ZIP Audit Reimbursement Program (ZARP)

By
Votes
750.07Mfor
96.35Magainst
54.43Mabstain
630MQuorum Reached
Skip to Votes

[TPP-3] ZIP Audit Reimbursement Program (ZARP)

Proposal TypeTPP
One Sentence SummaryAn annual program valued at $5m USD (89,285,714 ZK) to reimburse security audit costs for successfully executed ZKsync Improvement Proposals (ZIPs) in 2025, ensuring high security standards for ZKsync protocol development.
Proposal AuthorZKsync Foundation
Proposal SponsorCyfrin
Submitted Onchain2025-05-06
Versionv1
Summary of ActionThis proposal establishes a ZIP Audit Reimbursement Program valued at $5m USD in ZK (89,285,714 ZK) to reimburse developers for audit costs associated with successfully implemented ZIPs. The program will be funded through the ZK token minter and payments will be distributed autonomously upon the successful execution of a given ZIP.
Total ZK Requested89,285,714 ZK
Link to Forum Posthttps://forum.zknation.io/t/tpp-3-zip-audit-reimbursement-program-zarp/636
Link to ContractsZarpMain: 0x51E818785dEa065D392ac21F04E9cac5B601Cfd8, ZarpRetro: 0x70F6998FC0c492d9DD08b1105259252329be9Db6

Abstract

The ZIP Audit Reimbursement Program (ZARP) allocates $5m USD in ZK over the 2025 calendar year to increase security standards across the ZKsync protocol by reimbursing the costs associated with third-party audits of successful ZIPs. This program will ensure that ZIP developers strive for exceptional security audit standards, resulting in secure and robust contributions to the ZKsync protocol.

Motivation

This proposal aligns with GAP 001: ZKsync Token Program Priorities 2025, which emphasizes the importance of accelerating ZKsync protocol development. As security is a foundational pillar of protocol integrity, this program directly supports the "Secure the Protocol" priority within GAP 001.

Impact

This program directly contributes to securing the ZKsync protocol, aligning with the ZKsync Governance North Star metric of protecting assets, builders, and the community from adversarial actors. By ensuring that all ZIPs undergo thorough security audits, the program mitigates vulnerabilities and strengthens the resilience of the protocol, removing the financial burden of security audits.

Primary Goals & Metrics

GoalMetricTarget
Secure the Protocol% of successfully implemented ZIPs that receive audits100% of eligible ZIPs audited
Secure the ProtocolNumber of security incidents related to newly implemented ZIPs that require an emergency upgrade to resolve0 incidents
Public AccountabilityNumber of reimbursements publicly documented100% of reimbursements tracked

Token Mechanic

This Token Program Proposal (TPP) approves the creation of two capped minters to fund audit reimbursements for ZIPs executed in 2025. The total value of the two capped minters is 89,285,714 ZK, which is the ZK token value of $5m USD based on the 30-day average from 27 April 2025. An overview of the two capped minters is set out below:

  1. ZarpMain – A general-purpose capped minter for ZIPs executed between May 1 and December 31, 2025. A total of 49,810,714 ZK may be minted from ZarpMain. Each ZIP will request its own allocation from this minter.
  2. ZarpRetro – A capped minter to reimburse audit costs for ZIPs approved by the Token Assembly between January 1 and April 30, 2025. A total of 39,475,000 ZK may be minted from ZarpRetro.

updated-overview

1. ZarpMain: Future Audit Reimbursements (Q2 - Q4, 2025)

ZarpMain is a capped minter that will fund audit reimbursements for any developer who submits a successfully executed ZIP on ZKsync between May 1, 2025 and December 31, 2025. Any ZIP author is eligible to claim audit reimbursements by following the outlined process, supporting the decentralization of protocol development. Developers will deploy a nested “child” capped minter to be able to draw from this main capped minter with successful protocol upgrade execution.

ZarpMain Capped Minter Parameters

ParameterValue
NameZarpMain
Contract Address0x51E818785dEa065D392ac21F04E9cac5B601Cfd8
AdminProtocol Governor Timelock
TargetZK Token
Cap49,810,714 ZK
Start Time19 May 2025
End Time31 January 2026
Minter RoleN/A (child minters who assume the MINTER role are deployed per ZIP)

Eligibility Criteria

To be eligible for reimbursement:

  • The ZIP must be successfully executed on ZKsync between May 1 and December 31, 2025.
  • The ZIP must include a third-party audit from a recognized security firm.
  • Audit invoice(s) must be submitted for verification to the ZKsync Security Council via direct message on the governance forum, before the ZIP is submitted onchain.

Reimbursements cover audit fees, formal verification costs, and code competitions. They do not cover ZIP development labor, travel, or other indirect expenses. A given audit may only be reimbursed once.

Claim Process

To claim reimbursement through ZarpMain, ZIP authors must complete the following steps before onchain submission of the relevant ZIP:

  1. Deploy a child capped minter with the following parameters (see Capped Minter V2 for deployment instructions):
ParameterValue
AdminProtocol Governor Timelock
TargetZarpMain
CapAmount of ZK matching the reimbursement request calculated using the 30-day average of the price from the date the child capped minter is deployed.
Start Time30 days after the expected protocol upgrade approval date
End Time31 January 2026

Please reach out to Gov Team for support creating child capped minters.

  1. In the ZIP draft posted on the governance forum, include:
  • Link to the audit report
  • Link to the deployed child capped minter contract
  1. In the onchain ZIP submission, include calldata to:
  • Grant MINTER role:
    1. on the parent capped minter (ZarpMain) to the child capped minter; and
    2. on the child capped minter to the ZIP developer
  • Grant PAUSER role on the child capped minter to the ZKsync Security Council on ZKsync Era (0xfFB6126FF8401665081b771bB11cCD0e09f95D5A)

If the ZIP passes the Token Assembly vote, the child minter’s MINTER role will become active after a 30-day buffer. During this time, the Security Council will verify the audit details if it has not already done so. If necessary, the Security Council may pause the minter using their PAUSER role, preventing misuse of funds.

2. ZarpRetro: Past Audit Reimbursement (Q1, 2025)

ZarpRetro is a capped minter used to reimburse audit costs for ZIPs approved by the Token Assembly prior to April 30, 2025. Any ZIP author is eligible for retroactive reimbursement. Matter Labs has been the only developer to submit protocol upgrades to date. As a result, Matter Labs is the sole claimant under the ZarpRetro capped minter.

ZarpRetro Capped Minter Parameters

ParameterValue
NameZarpRetro
Contract Address0x70F6998FC0c492d9DD08b1105259252329be9Db6
AdminMatter Labs Multisig (0xb84cFd9EBA97d991afa2E7B76b900804eE911Ab7)
TargetZK Token
Cap39,475,000 ZK
Start Time19 May 2025
End Time31 January 2026
Minter Role[Admin to confirm post-execution]

The ZKsync Security Council has reviewed (or will review) the audit invoices and reports for ZIPs approved prior to 30 April 2025 to confirm eligibility.

The total value of the ZarpRetro Capped Minter is $2,210,600 USD. Using the 30-day average price of ZK from 27 April 2025, this amounts to 39,475,000 ZK tokens, which is the cap of the ZarpRetro Capped Minter.

Summary of Retro Audit Reimbursements

ZIPAmount Claimed (USD)
ZIP-3 Protocol Defense$91,440
ZIP-6 Gateway Prep$1,490,540
ZIP-9 EVM Emulator$628,620
Total USD$2,210,600
Total ZK <small>at 0.056 (30-day average)</small>39,475,000

Eligibility

All ZIPs approved by the Token Assembly prior to 30 April 2025 were developed by Matter Labs. As such, Matter Labs will define the MINTER address for the ZARPRetro capped minter.

Details of audit reimbursements being claimed by Matter Labs are set out in the tables below.

All reimbursements claimed from the ZarpRetro capped have been reviewed and approved by the Security Council.

Claim Process

As the admin of the ZarpRetro capped minter, Matter Labs will be able to assign the minter role at their discretion that will be able to mint tokens in the ZarpRetro capped minter. The tokens are available to mint at any time until 31 January 2026.

Plan

Measurement & Reporting

  • On-chain tracking: The ZarpMain Capped Minter will record all disbursements, ensuring transparency.
  • Quarterly governance updates: The Security Council will publish status reports tracking disbursements and participation.
  • End-of-year report: A detailed impact analysis will be presented to the community.

Accountability Framework

  • The Security Council will review all reimbursement requests.
  • Conflicts of interest will be managed via a recusal policy.
  • All reimbursements are publicly documented for transparency.
  • Program impact is evaluated annually with Token Assembly input.

Participants

  • Security Council (responsible for oversight and pausing ineligible distributions).
  • ZIP developers and/or contributors (subject to KYC/KYB as per ZKsync Association policy).
Votes
750.07Mfor
96.35Magainst
54.43Mabstain
630MQuorum Reached

Voters
0x0000...59deSyncSwapvoted for
106.33M
0x1b68...eead0x1b68...eeadvoted for
87.21M
https://forum.zknation.io/t/gap-3-authorization-for-security-council-to-convert-recovered-eth-into-zk/662/12
62.01M
Sharing the cost of development between MatterLabs and the DAO, while making it easier for other teams to get reimbursed on audits. Supported.
0x3fb1...4c8a0x3fb1...4c8avoted for
57.11M
0x97eb...fdc10x97eb...fdc1voted for
55.17M
0xe93d...e2b50xe93d...e2b5voted for
52.49M
0xf4b0...d8fa0xf4b0...d8favoted for
52.4M
45.06M
0xdedd...360dKeatingvoted for
39.07M
0xc118...ad2cCyfrinvoted for
37.78M
0xe8d8...3f310xe8d8...3f31voted for
37.5M
Audits are a huge expense and covering them is important.
0x1f76...5ed60x1f76...5ed6voted for
36.54M
0xafc7...831cDedaubvoted for
23.64M
Despite costs being much higher than current market prices for audits we will vote in favor. The audits involved were difficult to perform plus the providers took on some risk - such as the fact that they only get reimbursed once the zip goes through
0xbe1d...c9530xbe1d...c953voted for
23.48M
0x2198...6ee60x2198...6ee6voted against
14.48M
0x09fa...3bb0Demaciavoted against
14.42M
0xbe97...1b760xbe97...1b76abstained
14.13M
I am generally opposed to the idea of retro funding of non transparent invoices for a DAO. While the intention is good, this might set a questionable precedent.
0xc460...242bAlex MAZEabstained
13.63M
0xc639...915dInes txFusionabstained
13.61M
0x8b58...69b70x8b58...69b7voted against
13.01M
I am not seeing the rationale strong enough for doing this retrospectively
0x6abc...0c25Zyfivoted against
12.8M
Hey everyone, I’d like to share why I’m voting against this proposal in its current form, not out of disrespect for the work done, but because of serious concerns around process, fairness, and precedent. 1. No prior governance approval: The audit work was completed before any governance budget was approved. This opens the door for contributors to act independently, then submit reimbursement proposals after the fact, which is risky and unsustainable. 2. No transparent selection process: Auditors were selected without community input. Even if the firm is trusted (like OZ), governance should either approve a shortlist or validate budget and scope before work begins. Otherwise, there's no accountability or quality control mechanism from the DAO side. 3. Token price volatility introduces budget distortions: Retroactively reimbursing based on current token prices can lead to significantly overpaying, especially in volatile markets. This could lead to large drains on the treasury without appropriate foresight. 4. Ecosystem contributors like Zyfi were never retro-paid: Zyfi has provided critical infrastructure, including gasless transactions and driving adoption of native account abstraction, without ever asking for retroactive compensation. We've helped projects scale user acquisition at our own cost because we believed in the mission. It would be unfair to start retro-paying select contributors unless there’s a clear and consistent structure everyone follows. Constructive suggestion: If we want to be fair while acknowledging the work done: Pay 50% of the requested dollar amount as a one-time reimbursement for the Auditor to be break even in it's work. This should be tied to the token price at the time of tokens given. This would be an exception for this. Otherwise Matter Labs should pay the full amount and we should have new processes. Then introduce a new proposal for future audits, where: - Budgets are approved in advance. - Auditor selection is either pre-whitelisted or openly discussed. - Payment is milestone-based. - Payouts are done in dollars at the price of ZK when tokens are sent. This would allow the DAO to maintain credibility, protect its treasury, and treat contributors fairly, whether they’re protocol developers or infrastructure teams like us. Happy to work with others to help shape a better framework if needed. Let’s build something sustainable.
0x3228...d932Holdstationvoted against
12.66M
0x96f0...30710x96f0...3071voted against
11.83M
The fee is too high, and the timing isn't ideal.
0x8567...c7e90x8567...c7e9voted for
11.31M
0xcbde...0d400xcbde...0d40abstained
8.3M
0x2596...6fc50x2596...6fc5voted against
3.36M
0xc805...55800xc805...5580voted against
2.85M
0xeb40...2ee70xeb40...2ee7voted for
2.1M
0xf0ea...4ba20xf0ea...4ba2voted for
2.02M
0x0542...43e10x0542...43e1abstained
1.36M
Generally speaking I am of course in favor of security and hence auditing of ZIPs. I abstain because I am not sure this current process is the best to pay for audits.
0x83cc...0b7c0x83cc...0b7cvoted against
1.31M
0x1729...b8790x1729...b879voted for
1.17M
0x25cc...038a0x25cc...038avoted for
1.04M
0x5419...35180x5419...3518voted for
982.02K
0x035e...17d30x035e...17d3voted against
960.69K
0x3d18...9adb0x3d18...9adbabstained
918.33K
0x8715...b2390x8715...b239abstained
891.17K
Democratising lobbyism, on-chain. Check out lobbyfi.xyz
0x8659...7d0e0x8659...7d0evoted for
749.56K
0x1bc9...33ca0x1bc9...33cavoted against
718.55K
0x09cd...74b50x09cd...74b5voted against
489.94K
https://x.com/neutize_/status/1919797681431670811
0x22e2...83750x22e2...8375voted against
487.08K
the pricing period is quite bad. also future budget is too much.
0x915f...55a00x915f...55a0voted for
474.29K
0xd39e...e5950xd39e...e595voted for
437.42K
0xafd5...a0a00xafd5...a0a0voted for
385.23K
0x6609...79c10x6609...79c1voted against
297.56K
0x0cb0...58150x0cb0...5815voted for
293.02K
0xffa1...11b20xffa1...11b2voted for
287.15K
0x00a7...5f480x00a7...5f48voted for
245.83K
0xf30e...584a0xf30e...584avoted for
243.19K
0xab9c...c17f0xab9c...c17fvoted against
242.37K
0xb792...89d70xb792...89d7voted for
239.6K
0xf53a...365a0xf53a...365avoted for
237.63K
0x9c52...2a550x9c52...2a55abstained
230.03K
0xc640...c0c30xc640...c0c3voted against
228.19K
0xf278...8f7c0xf278...8f7cvoted for
226.74K
0x2f2f...f78a0x2f2f...f78avoted for
223.26K
0xb356...c8260xb356...c826voted for
219.54K
The Event Horizon Community voted FOR on this Proposal (ehZKS-3): EventHorizon.vote/vote/zksync/ehZKS-3
0x0e29...2bdf0x0e29...2bdfvoted for
205.87K
0x902c...063b0x902c...063bvoted against
205.87K
0x7526...b18e0x7526...b18eabstained
201.3K
0x6de8...5dfd0x6de8...5dfdvoted for
200K
You can find our rationale in our delegate thread: https://forum.zknation.io/t/proxy-prev-boardroom-delegate-communication-thread/330/10
0xa832...40030xa832...4003voted for
198.52K
0x1b1e...40110x1b1e...4011voted for
198.08K
0xaa58...42610xaa58...4261voted against
184.3K
0x75ed...76850x75ed...7685voted against
183.82K
0xc41a...018b0xc41a...018bvoted against
183.34K
0xc2be...2cbc0xc2be...2cbcvoted for
180.1K
0x3ae5...3b3c0x3ae5...3b3cvoted for
176.96K
0x0991...c26a0x0991...c26avoted for
172.51K
0xe4a5...214a0xe4a5...214avoted for
160.57K
0x015e...02130x015e...0213abstained
153.57K
0xe0a4...b56f0xe0a4...b56fvoted against
144.89K
0x8c57...a7a10x8c57...a7a1voted against
142.94K
0xc830...c6ad0xc830...c6adabstained
136.45K
0xe442...30cc0xe442...30ccvoted for
135.21K
0x5ffd...0e180x5ffd...0e18voted for
134.49K
0x9c57...fa520x9c57...fa52voted against
130.06K
0xa2a2...76580xa2a2...7658voted against
127.2K
Conflict. If prop is for the benefit of ZIP owners, it should be proposed by ZIP owners, not by their vendor.
0x5444...1c160x5444...1c16voted against
126.27K
0xed32...6fcd0xed32...6fcdvoted for
115.13K
0x3062...b7740x3062...b774voted for
113.32K
0x1307...b54e0x1307...b54evoted for
111.8K
0x8d7e...fb9d0x8d7e...fb9dvoted for
109.47K
0x7da0...618a0x7da0...618avoted against
107.87K
0x7552...f9f10x7552...f9f1voted for
106.79K
0x59a9...ac020x59a9...ac02voted for
105.57K
0x9e0e...e6e90x9e0e...e6e9voted against
103.83K
0x4fda...b3610x4fda...b361voted for
102.91K
0x2869...b9850x2869...b985voted for
102.76K
0x9fb8...a7d60x9fb8...a7d6voted for
102.61K
Seems that whoever voted yes on Matter Labs Zips wanted this so therefore should pay for it.
0x01f7...dc080x01f7...dc08voted for
101.91K
0xe719...2be50xe719...2be5voted for
101.9K
0x5bfc...1aa00x5bfc...1aa0voted for
101.77K
0x375e...e6660x375e...e666voted for
101.71K
0x2be2...48730x2be2...4873voted for
101.7K
0x1e39...82d40x1e39...82d4voted for
101.7K
0x3997...7b490x3997...7b49voted for
101.7K
0xc8a7...ba330xc8a7...ba33voted for
101.31K
0xf9c9...bebc0xf9c9...bebcvoted against
100.67K
0xb882...b93e0xb882...b93evoted for
100.39K
0x8ea6...fcf50x8ea6...fcf5voted for
100.31K
0x4029...7e3f0x4029...7e3fvoted for
100.21K
0xc22f...0e2a0xc22f...0e2avoted for
100.13K
0x828b...c8250x828b...c825voted for
100.08K
0x86e6...290d0x86e6...290dvoted for
100.07K
0x92b5...f8550x92b5...f855voted for
100.06K
0xc4f9...a0220xc4f9...a022voted for
100.04K
0x8e05...9a1a0x8e05...9a1avoted against
100.01K
0xfef7...82e30xfef7...82e3voted for
100.01K
0xfb40...72500xfb40...7250abstained
100K
0xd895...582c0xd895...582cvoted against
100K
0xecd0...6d740xecd0...6d74abstained
100K
0x0e41...9a0d0x0e41...9a0dvoted for
100K
0x7321...93600x7321...9360voted for
100K
0x5f89...ba860x5f89...ba86voted against
99.96K
0xa51f...e9300xa51f...e930voted for
97.47K
0x73fa...72e00x73fa...72e0voted against
96.94K
0xbd8e...f9e30xbd8e...f9e3voted for
95.95K
0x69c0...523d0x69c0...523dvoted for
95.44K
0x9816...e53d0x9816...e53dvoted for
93.95K
0x95a4...5d810x95a4...5d81voted against
91.55K
0x1653...e6050x1653...e605voted for
91.39K
0x9ec6...4c7f0x9ec6...4c7fvoted against
90.94K
I don't think we should have to pay for it, I believe there are other % of the supply that could be put to use for this audit.
0x66e1...29a80x66e1...29a8voted for
89.22K
0xad74...0a270xad74...0a27voted for
87.33K
0x78db...a99d0x78db...a99dvoted for
86.8K
0x0579...40480x0579...4048voted for
86.59K
This proposal incentivizes rigorous security practices by reimbursing audit costs, ensuring ZIPs are thoroughly vetted. It strengthens protocol integrity, protects users, and aligns with governance priorities to secure ZKsync.
0xb365...80bb0xb365...80bbvoted for
86.38K
0x0797...467b0x0797...467bvoted for
85K
0x2c2f...3d580x2c2f...3d58voted for
84K
0x77bc...feef0x77bc...feefvoted for
82.62K
Absolutely FOR when it comes to security features and money spent towards audits etc.
0x2f95...88ae0x2f95...88aevoted for
82.18K
0x57d7...4bff0x57d7...4bffvoted for
82.06K
0xf9d3...173e0xf9d3...173evoted for
81.84K
0x8a2f...033a0x8a2f...033avoted against
81.74K
0x09da...a7d40x09da...a7d4voted for
80.17K
0xc554...f8e70xc554...f8e7voted for
79.79K
0xcb61...58dc0xcb61...58dcvoted for
79.03K
0x0d23...330b0x0d23...330bvoted for
78.13K
0xd483...84e50xd483...84e5voted against
77.13K
0x5b82...c0a00x5b82...c0a0voted against
76.5K
0xa86c...bff80xa86c...bff8voted for
75.51K
0x884c...36ca0x884c...36cavoted for
75.25K
0x7b1d...5eb60x7b1d...5eb6voted for
74.89K
0x17e8...f1430x17e8...f143voted for
72.58K
0x1616...39170x1616...3917voted for
70.64K
0xca3d...918b0xca3d...918bvoted for
70.02K
0x66d4...d1820x66d4...d182voted for
69.96K
0x4494...236b0x4494...236bvoted against
69.35K
0x90aa...8a480x90aa...8a48voted for
67.3K
0x0187...e2100x0187...e210voted against
63.86K
0xf618...17410xf618...1741voted for
63.72K
0x8c57...0f610x8c57...0f61voted for
63.69K
0x2725...e8310x2725...e831voted for
63.56K
0xc446...52de0xc446...52devoted for
62.13K
0xeab8...62d10xeab8...62d1voted against
62.05K
0xfa73...e8a20xfa73...e8a2abstained
60.1K
0xe704...50e40xe704...50e4voted for
59.36K
0x23d3...59360x23d3...5936voted against
59.34K
0x3566...163b0x3566...163bvoted against
56.45K
0xaea3...9f710xaea3...9f71voted for
55.06K
Security is key to any ecosystem. I believe the ZIP Audit Reimbursement Program will help ensure both future and past developments remain secure. By being backed by the protocol, it discourages cutting corners on audits. The more secure the chain and its upgrades, the more likely it is to attract users and institutions.
0x7d3a...f87c0x7d3a...f87cvoted for
54.51K
0x8412...62cc0x8412...62ccvoted against
54.21K
0x92c4...f8e60x92c4...f8e6voted against
53.93K
0x0253...d11a0x0253...d11avoted against
53.26K
0xe6f9...87be0xe6f9...87bevoted against
52.41K
0x904d...92a90x904d...92a9voted for
51.24K
0x00a6...98cd0x00a6...98cdvoted for
51K
0xff4f...a2860xff4f...a286voted against
50.91K
0x5064...9c070x5064...9c07voted against
50.75K
no pls
0x5a2c...fdcf0x5a2c...fdcfvoted against
50.57K
0xdd65...d1ec0xdd65...d1ecvoted for
50.57K
0xe12f...d9b70xe12f...d9b7abstained
50.12K
0x4a02...47840x4a02...4784voted for
50.04K
0x01a6...763e0x01a6...763evoted against
47.21K
0x9be1...e8c30x9be1...e8c3voted against
46.96K
0x1082...e1470x1082...e147voted against
45.68K
0x3dc4...e80d0x3dc4...e80dvoted against
45.23K
0x512f...9f270x512f...9f27voted for
44.74K
0xb360...28bd0xb360...28bdvoted for
44.02K
0x204f...12b20x204f...12b2voted for
43.96K
0x790d...4f150x790d...4f15voted for
43.74K
0x585a...85880x585a...8588voted against
43.53K
0x9d74...6ec20x9d74...6ec2voted against
43.39K
I'm certainly a small plankton, but I agree with other voters that especially the retro-active compensation of this ZIP is a bit too intransparent since token holders had no say in the selection process of auditors. If this ZIP were split into two parts, I'd reconsider voting yes for the future reimbursements.
0x67c5...e6ce0x67c5...e6cevoted against
43.39K
0x147e...79210x147e...7921voted for
42.29K
0x231d...a7640x231d...a764voted for
41.55K
0x47b4...23380x47b4...2338voted against
41.26K
0xd5d7...3c4d0xd5d7...3c4dvoted against
40.69K
0xc6ad...fa8a0xc6ad...fa8avoted for
40.5K
0xd822...42090xd822...4209voted for
40.45K
0x76e9...1d1d0x76e9...1d1dvoted against
40.34K
0x43b6...a7e40x43b6...a7e4voted for
40.01K
0x4040...f34b0x4040...f34bvoted for
39.56K
0x7d3b...f16a0x7d3b...f16avoted against
39.09K
0xc2b5...db7a0xc2b5...db7avoted for
39.07K
0x7028...595e0x7028...595eabstained
38.91K
0xa2b2...55e30xa2b2...55e3voted for
38.56K
0xda56...74ce0xda56...74cevoted for
38.11K
0xdea5...567a0xdea5...567aabstained
37.91K
0xd525...14190xd525...1419voted against
37.24K
0x0dcd...8c800x0dcd...8c80voted against
37.24K
0x5990...29a50x5990...29a5voted for
36.35K
0x2d7d...b05e0x2d7d...b05evoted for
36K
0x3d02...80280x3d02...8028voted against
35K
0xaf7f...63cb0xaf7f...63cbvoted against
34.48K
0x3037...a9dd0x3037...a9ddvoted for
34.24K
0xf8e6...1c0a0xf8e6...1c0avoted for
33.9K
0xc3cb...c2010xc3cb...c201voted against
33.2K
nooooooooooooo
0xf8df...5b160xf8df...5b16voted for
32.68K
0x12fe...fc210x12fe...fc21voted against
32.17K
0xb62e...e4950xb62e...e495abstained
31.77K
0xe40c...ea950xe40c...ea95voted for
31.67K
0xc701...e2150xc701...e215voted against
31.57K
0x7edf...72800x7edf...7280voted for
30.9K
0xd2c7...c6310xd2c7...c631voted for
30.69K
0x3778...e48a0x3778...e48avoted for
30.47K
0x88bf...600c0x88bf...600cvoted for
30.21K
0x8e58...e9380x8e58...e938voted against
30K
0xb529...94030xb529...9403voted for
29.26K
0xb68d...f20b0xb68d...f20bvoted for
29.03K
0x056d...8da60x056d...8da6voted against
28.7K
0x98d3...e4780x98d3...e478voted for
28.66K
0xd529...c4ff0xd529...c4ffvoted against
27.09K
0x1fb7...aa1c0x1fb7...aa1cvoted for
26.62K
0xf643...3c160xf643...3c16voted for
26.39K
0xca07...6d8d0xca07...6d8dvoted against
26.01K
0xbc10...267f0xbc10...267fvoted against
25.31K
0x590c...f7d40x590c...f7d4voted against
25.3K
0x6bab...857f0x6bab...857fvoted for
25.22K
0x2caf...10b40x2caf...10b4voted for
25.17K
0x7570...bae70x7570...bae7voted against
24.57K
0x251d...97860x251d...9786voted for
23.96K
0x826b...0dad0x826b...0dadvoted for
23.94K
0xab23...74ab0xab23...74abvoted for
23.93K
0xbe7a...b9ba0xbe7a...b9bavoted for
23.74K
0x16a3...d94e0x16a3...d94evoted against
23.53K
0x4fff...ac830x4fff...ac83abstained
23.25K
0xebcc...7f480xebcc...7f48voted against
23.2K
0x00df...49e80x00df...49e8voted against
23.03K
0x4166...b7e00x4166...b7e0voted for
22.4K
0x25b6...02960x25b6...0296abstained
22.31K
0x166f...6d450x166f...6d45voted against
21.73K
hell no
0x5e83...cd2a0x5e83...cd2avoted against
21.66K
0x80f8...04f80x80f8...04f8voted against
21.57K
0x9087...47ea0x9087...47eavoted against
21.55K
0x9b62...9cc70x9b62...9cc7voted for
21.35K
0x0130...7cc90x0130...7cc9voted for
21.16K
0x664b...91450x664b...9145voted against
21.05K
0xe428...79100xe428...7910voted for
21.04K
0x360b...63200x360b...6320abstained
21.01K
0x0321...3c040x0321...3c04voted for
20.93K
0xd07d...d8dd0xd07d...d8ddvoted for
20.9K
0x18fe...2e1e0x18fe...2e1evoted for
20.84K
0x711e...f7df0x711e...f7dfvoted for
20.65K
0x3aef...b1440x3aef...b144abstained
20.55K
0x5ec8...77c60x5ec8...77c6voted for
20.47K
0xb208...97870xb208...9787voted for
20.46K
0x6648...257b0x6648...257bvoted against
20.44K
0xa191...02c50xa191...02c5voted for
20.24K
0x80ee...95930x80ee...9593voted for
20.2K
0xf918...c5e80xf918...c5e8voted against
20.18K
0xe5e8...3b680xe5e8...3b68voted for
20.09K
0xde49...9dec0xde49...9decvoted against
20.06K
0x3fbe...7ef60x3fbe...7ef6voted for
20K
0x6f74...eaf10x6f74...eaf1abstained
19.83K
0xe1b9...72600xe1b9...7260voted for
19.62K
0xfee7...32a10xfee7...32a1abstained
19.43K
0x657a...f87c0x657a...f87cvoted for
19.24K
0x06d7...ccbd0x06d7...ccbdvoted for
19.13K
0x61df...7c1e0x61df...7c1evoted for
19.12K
0xf882...f1be0xf882...f1bevoted for
19.01K
0x1f82...67e10x1f82...67e1voted for
18.87K
0x240c...a5070x240c...a507voted for
18.14K
0x140a...ea2c0x140a...ea2cvoted for
18.07K
0xb34b...77170xb34b...7717voted for
17.5K
0x13fb...52a70x13fb...52a7voted against
17K
0xc9f6...78b20xc9f6...78b2voted for
16.78K
0xc35b...66870xc35b...6687voted against
16.48K
0x98cf...81d90x98cf...81d9voted against
16.3K
0x12f8...62a90x12f8...62a9voted for
16.17K
0x55ec...6bda0x55ec...6bdavoted against
16.16K
0x6c4d...7fac0x6c4d...7facvoted for
15.91K
0xa4f5...cd4b0xa4f5...cd4bvoted for
15.83K
0x92f1...ee0f0x92f1...ee0fvoted for
15.71K
0x379a...5b980x379a...5b98voted for
15.64K
0x19f1...11380x19f1...1138voted for
15.59K
0x7de8...dd470x7de8...dd47voted for
15.44K
0xb068...10a50xb068...10a5voted against
15.4K
0xf447...6a470xf447...6a47voted for
15.37K
0x2748...ac260x2748...ac26voted for
15.35K
0x3dbb...38ae0x3dbb...38aevoted for
15.03K
0x396d...c3dd0x396d...c3ddvoted against
15.01K
0xe838...6e080xe838...6e08voted against
14.96K
chutiya proposal i am against it
0xd1dd...46b10xd1dd...46b1voted for
14.96K
0x0be3...2a0c0x0be3...2a0cvoted for
14.93K
0xe5d3...38b90xe5d3...38b9voted for
14.72K
0x5721...8f050x5721...8f05voted against
14.68K
0x2ae1...e2320x2ae1...e232voted against
14.65K
0xc7b6...ca370xc7b6...ca37voted against
14.6K
0x20f8...a1e50x20f8...a1e5voted for
14.6K
0xc987...203b0xc987...203bvoted for
14.56K
0xc230...e3d90xc230...e3d9voted against
14.52K
0xfa06...28140xfa06...2814voted for
14.12K
0xc991...bd330xc991...bd33voted against
13.97K
0x8e7e...15480x8e7e...1548voted against
13.77K
0x16fd...91f10x16fd...91f1voted against
13.77K
0xbd3d...52360xbd3d...5236abstained
13.67K
0x6b4d...7e090x6b4d...7e09voted for
13.54K
0x636e...64e00x636e...64e0voted against
13.3K
0xded5...58c40xded5...58c4voted for
13.3K
0x2bcb...10a80x2bcb...10a8abstained
13.3K
0x2942...74080x2942...7408voted for
13.15K
0xbedf...c5640xbedf...c564voted against
13.11K
0x3ddc...05b00x3ddc...05b0voted for
12.99K
0xd2f4...f8ab0xd2f4...f8abvoted for
12.99K
0x9ea8...0d930x9ea8...0d93voted against
12.88K
0x2b86...b2f90x2b86...b2f9voted for
12.87K
0xd3be...17b80xd3be...17b8voted against
12.78K
0xf84a...51870xf84a...5187voted against
12.67K
0x82e2...c6db0x82e2...c6dbvoted for
12.61K
0xe0de...ce160xe0de...ce16voted for
12.57K
0xf824...ca7c0xf824...ca7cvoted for
12.55K
0x41d2...2eec0x41d2...2eecvoted for
12.54K
0x5528...8c870x5528...8c87voted against
12.48K
0x3a09...97960x3a09...9796abstained
12.42K
0x4164...cf180x4164...cf18voted for
12.33K
0x095c...726e0x095c...726eabstained
12.21K
0x4ca0...058d0x4ca0...058dvoted for
12.01K
0xfbf6...f7980xfbf6...f798voted for
12.01K
0x8458...176f0x8458...176fvoted against
11.96K
0x8c58...9c710x8c58...9c71voted against
11.89K
0x27b0...14d20x27b0...14d2voted against
11.81K
0xd09a...940e0xd09a...940eabstained
11.76K
0x78b1...d4c80x78b1...d4c8abstained
11.74K
0xe35b...bf2e0xe35b...bf2evoted for
11.74K
0xeade...b1c50xeade...b1c5voted against
11.71K
0x768e...caa40x768e...caa4voted for
11.63K
0xdb57...bc2e0xdb57...bc2evoted against
11.63K
0x3743...84300x3743...8430voted for
11.5K
0xac63...d2cb0xac63...d2cbvoted for
11.44K
0x22ec...d4760x22ec...d476voted for
11.39K
0x373f...c1400x373f...c140voted for
11.31K
0xa75d...a5420xa75d...a542abstained
11.28K
0xc4f5...9dac0xc4f5...9dacvoted against
11.27K
0xe321...321a0xe321...321avoted for
11.25K
0x5828...3ad90x5828...3ad9voted against
11.24K
0x2e19...dde70x2e19...dde7voted against
11.16K
0x5a86...d2a60x5a86...d2a6voted against
11.1K
negative
0xe6cd...d6e00xe6cd...d6e0voted against
10.98K
0xa49f...6c070xa49f...6c07voted for
10.94K
0xadcf...79390xadcf...7939voted for
10.91K
0x4b75...5a810x4b75...5a81voted against
10.9K
0x04af...f5ee0x04af...f5eevoted for
10.89K
0xe039...79e70xe039...79e7voted against
10.7K
reject this proposal
0x93dd...02e10x93dd...02e1voted for
10.57K
0x66e8...33cb0x66e8...33cbvoted against
10.55K
0x2b1a...109f0x2b1a...109fvoted for
10.52K
0x920c...2ce00x920c...2ce0voted for
10.49K
0x3e47...c6a20x3e47...c6a2voted for
10.48K
0x28a9...03220x28a9...0322voted for
10.44K
0x2457...81850x2457...8185voted against
10.44K
0x169d...25540x169d...2554voted for
10.4K
0xf849...69880xf849...6988voted against
10.35K
0xb44a...95070xb44a...9507voted for
10.26K
0xa772...61710xa772...6171voted for
10.24K
0x583c...21610x583c...2161voted for
10.24K
0xd6b8...9b800xd6b8...9b80voted against
10.22K
0x23ad...fe9c0x23ad...fe9cvoted for
10.19K
0xa04f...97df0xa04f...97dfvoted against
10.19K
0x3f3e...8bea0x3f3e...8beavoted against
10.17K
0xadcc...5a6a0xadcc...5a6avoted against
10.13K
0x571c...98fc0x571c...98fcvoted against
10.11K
0x4d9b...c7f50x4d9b...c7f5voted against
10.09K
0x407d...99aa0x407d...99aavoted for
10.08K
0x29ba...aa310x29ba...aa31voted against
10.04K
0xd0d0...1dc50xd0d0...1dc5voted for
10.02K
0x3a03...d06c0x3a03...d06cvoted against
10.01K
0xf165...52060xf165...5206voted against
10.01K
lol
0x0fd1...13da0x0fd1...13davoted against
10.01K
0x4cb7...7cd50x4cb7...7cd5abstained
10K
0xda09...c60c0xda09...c60cabstained
10K
0x3c35...570d0x3c35...570dvoted for
10K
0x5595...1b220x5595...1b22voted for
9.97K
0x48d6...a1a50x48d6...a1a5voted against
9.96K
0xddb8...cc1d0xddb8...cc1dvoted for
9.83K
0xf813...32f80xf813...32f8voted against
9.76K
0x0875...f9b10x0875...f9b1voted against
9.75K
0x627a...bde90x627a...bde9voted for
9.65K
0xb766...c8c00xb766...c8c0voted against
9.61K
0x7d10...d79a0x7d10...d79avoted against
9.55K
0x197e...d6d10x197e...d6d1voted against
9.53K
0x236e...dfdd0x236e...dfddvoted against
9.46K
0x5b3b...04dc0x5b3b...04dcvoted for
9.42K
0x7b62...a1140x7b62...a114voted for
9.34K
0xcc4f...baa50xcc4f...baa5voted against
9.3K
0x9e19...a3990x9e19...a399voted for
9.26K
0x2b4e...30160x2b4e...3016voted for
9.25K
0x401f...dc490x401f...dc49voted against
9.21K
0x3f4d...a6f90x3f4d...a6f9voted against
9.09K
0x0b1c...15210x0b1c...1521voted against
9.08K
0xf652...df390xf652...df39voted against
9.04K
0x2c36...db870x2c36...db87voted against
9.04K
0x3519...52cb0x3519...52cbabstained
9.03K
0xa00f...67d10xa00f...67d1voted against
9.02K
0xcb5e...7dbc0xcb5e...7dbcvoted against
9K
0x3fc7...ec040x3fc7...ec04voted for
9K
0x638b...f3a80x638b...f3a8voted against
8.96K
0x2863...84cb0x2863...84cbvoted for
8.93K
0x3efd...5b490x3efd...5b49voted against
8.91K
0x5fe1...4ea00x5fe1...4ea0voted against
8.91K
0x3fa4...1d5e0x3fa4...1d5evoted against
8.9K
0x511c...c1120x511c...c112voted against
8.88K
0x546d...d7860x546d...d786voted against
8.84K
0x51dc...98990x51dc...9899voted for
8.8K
0x3f05...1a770x3f05...1a77voted against
8.79K
0xd1d3...4b480xd1d3...4b48voted for
8.74K
0xab34...8cfe0xab34...8cfevoted against
8.7K
0x3da0...23d60x3da0...23d6abstained
8.64K
0xf57b...f0280xf57b...f028voted against
8.63K
0xd132...f9080xd132...f908voted against
8.6K
0x781b...fd120x781b...fd12voted against
8.47K
0x2c6b...4eb20x2c6b...4eb2voted for
8.43K
0x2697...82ff0x2697...82ffvoted against
8.4K
0xa8cb...690e0xa8cb...690evoted against
8.34K
0xb7ee...97720xb7ee...9772voted for
8.24K
0xb5f6...6e1c0xb5f6...6e1cvoted for
8.18K
0x1e74...2a900x1e74...2a90voted against
8.14K
0xd91e...f3b40xd91e...f3b4voted against
8.1K
0x2aa9...72c90x2aa9...72c9abstained
8.08K
0xdc4a...54320xdc4a...5432voted against
8.02K
0x8b0c...f07f0x8b0c...f07fvoted for
7.96K
0xcecd...46e10xcecd...46e1voted against
7.94K
0x237a...760d0x237a...760dvoted for
7.91K
0x457b...8d510x457b...8d51voted for
7.82K
0x4071...cc600x4071...cc60abstained
7.82K
0x4024...109f0x4024...109fvoted for
7.76K
0xc907...95060xc907...9506voted for
7.67K
0x01fe...7a7d0x01fe...7a7dvoted against
7.55K
0x558b...1c480x558b...1c48voted against
7.55K
0x5e9b...251b0x5e9b...251bvoted for
7.51K
0x274d...73f40x274d...73f4voted against
7.48K
0xa209...5a1d0xa209...5a1dabstained
7.47K
0x8a52...0dd30x8a52...0dd3voted against
7.45K
0xd62e...17f30xd62e...17f3voted for
7.4K
0x6258...5d480x6258...5d48voted for
7.39K
0x5acc...fbf90x5acc...fbf9voted against
7.36K
0x2d1b...1ea30x2d1b...1ea3voted against
7.3K
0x7407...b0160x7407...b016voted against
7.24K
0xb941...0b870xb941...0b87abstained
7.23K
0xc343...6ccf0xc343...6ccfvoted for
7.21K
0x01b8...45ad0x01b8...45advoted against
7.12K
0x041b...86850x041b...8685voted for
7.1K
0x14ce...df5c0x14ce...df5cvoted against
7.05K
0x279a...dbea0x279a...dbeavoted against
7.05K
0x7432...e3b50x7432...e3b5voted for
7.01K
0xd947...d4e50xd947...d4e5abstained
7K
0x1d4f...0d860x1d4f...0d86voted for
6.94K
0xd0a4...648e0xd0a4...648evoted for
6.93K
0x8b3c...43c30x8b3c...43c3voted for
6.9K
0xf738...b0b60xf738...b0b6voted for
6.86K
0xa0ef...2d560xa0ef...2d56voted against
6.86K
0x103c...34170x103c...3417voted for
6.84K
0x8de4...37b70x8de4...37b7voted against
6.81K
0x7e4f...80180x7e4f...8018voted for
6.76K
0xf6c2...83690xf6c2...8369voted for
6.73K
0x055d...3aa10x055d...3aa1voted for
6.7K
0x420d...2d950x420d...2d95voted against
6.7K
0x7c6b...7bb60x7c6b...7bb6voted for
6.61K
0x7407...4b2a0x7407...4b2avoted against
6.6K
cnt
0xe839...42ba0xe839...42bavoted for
6.53K
0xafe1...d8720xafe1...d872voted for
6.52K
0x77d7...c7b80x77d7...c7b8voted for
6.52K
0x8824...941f0x8824...941fvoted for
6.49K
0xfe8c...77450xfe8c...7745voted for
6.48K
0x8ae0...7a560x8ae0...7a56voted against
6.44K
0x7c61...6fab0x7c61...6fabvoted against
6.34K
0x9012...e8120x9012...e812voted against
6.34K
0x4602...3c4a0x4602...3c4avoted against
6.3K
0xc964...84710xc964...8471voted against
6.3K
0x064b...228b0x064b...228bvoted against
6.29K
0xcf7f...92770xcf7f...9277voted against
6.27K
0x0bda...06fc0x0bda...06fcvoted for
6.24K
0x9248...04e20x9248...04e2voted for
6.24K
0xf757...a5070xf757...a507abstained
6.2K
0x5f11...fcda0x5f11...fcdavoted for
6.17K
0xe992...d6200xe992...d620voted against
6.14K
0x6e79...7b370x6e79...7b37voted against
6.13K
0x52a6...bc5c0x52a6...bc5cvoted for
6.12K
0xe150...ae440xe150...ae44voted for
6.11K
0x8454...80ce0x8454...80cevoted against
6.1K
0x50d0...9c230x50d0...9c23voted for
6.05K
i vote for
0x1539...eb960x1539...eb96voted against
6.03K
0x3151...e1140x3151...e114voted against
6.02K
0x3922...b70e0x3922...b70eabstained
6.02K
0x669e...e7a40x669e...e7a4voted for
6.01K
0xbef8...f43c0xbef8...f43cvoted for
5.99K
0x93ef...bbff0x93ef...bbffvoted for
5.92K
0x69ee...f21f0x69ee...f21fvoted against
5.88K
0x26b7...0a660x26b7...0a66voted for
5.88K
0x0228...f93c0x0228...f93cvoted for
5.88K
0xa7f1...dc100xa7f1...dc10voted for
5.86K
0xf5bb...9f7e0xf5bb...9f7evoted for
5.86K
0xbc37...077f0xbc37...077fvoted for
5.82K
0xf9f1...4bab0xf9f1...4babvoted for
5.8K
0x840f...81160x840f...8116voted for
5.78K
0x211b...4bef0x211b...4befvoted for
5.77K
0x5a01...9d2b0x5a01...9d2bvoted against
5.74K
0x3216...2b840x3216...2b84voted against
5.71K
0xa589...05b40xa589...05b4voted for
5.63K
0xb687...ccc90xb687...ccc9abstained
5.63K
0xeb00...70940xeb00...7094voted against
5.63K
0x02e1...ac960x02e1...ac96voted against
5.63K
0x205c...d85e0x205c...d85evoted against
5.6K
0xc398...c4ac0xc398...c4acvoted for
5.55K
0xb16b...33bb0xb16b...33bbvoted against
5.52K
0x66e8...fd0d0x66e8...fd0dvoted against
5.51K
0x21c5...904a0x21c5...904avoted against
5.46K
0x6583...73a00x6583...73a0voted for
5.45K
0x4621...89030x4621...8903abstained
5.44K
0x83f9...07840x83f9...0784voted for
5.43K
0x1d1e...5ad90x1d1e...5ad9voted for
5.41K
0xab1d...06380xab1d...0638voted for
5.39K
0x56b4...4c170x56b4...4c17voted for
5.38K
0x3af4...85210x3af4...8521abstained
5.37K
0x5a3c...2b390x5a3c...2b39voted against
5.35K
0x2d5d...87fc0x2d5d...87fcvoted for
5.31K
0xb1e1...d83e0xb1e1...d83evoted against
5.27K
0x3a26...a01f0x3a26...a01fabstained
5.27K
0xa336...28030xa336...2803voted for
5.23K
0xbc97...f4ff0xbc97...f4ffvoted against
5.22K
0xe2e4...d4470xe2e4...d447voted for
5.22K
0x3732...a57d0x3732...a57dvoted for
5.21K
0xd893...64950xd893...6495abstained
5.21K
0xc2a4...e2b10xc2a4...e2b1abstained
5.2K
0xa2b3...98040xa2b3...9804voted against
5.2K
0x0c5e...63dd0x0c5e...63ddvoted against
5.17K
0xce0c...02fa0xce0c...02favoted for
5.17K
0xe58d...9fe50xe58d...9fe5voted for
5.15K
0xe331...91640xe331...9164abstained
5.15K
0x9a1b...d24b0x9a1b...d24bvoted for
5.15K
0x3563...ff270x3563...ff27voted against
5.13K
0x9407...a04c0x9407...a04cvoted for
5.13K
0xc3fc...5a050xc3fc...5a05voted against
5.12K
0xd621...7fbd0xd621...7fbdvoted for
5.1K
0x0ce1...c6700x0ce1...c670voted for
5.09K
0x4f49...efb10x4f49...efb1voted for
5.09K
0x0fd8...db950x0fd8...db95voted against
5.08K
0xcd0d...11680xcd0d...1168voted for
5.08K
0x0de7...8b280x0de7...8b28voted for
5.07K
0x462b...400d0x462b...400dvoted against
5.07K
0x5ec1...e8b90x5ec1...e8b9voted for
5.07K
0xea7d...36fe0xea7d...36fevoted for
5.06K
0x9277...7aed0x9277...7aedabstained
5.04K
0x485e...ca0f0x485e...ca0fvoted for
5.01K
0x3575...98970x3575...9897voted for
5K
0x6d98...3bbf0x6d98...3bbfvoted against
5K
0xd647...4a300xd647...4a30abstained
5K
0x25fa...2db60x25fa...2db6voted for
5K
0xbb98...8e0c0xbb98...8e0cvoted against
5K
0x06c4...66a20x06c4...66a2voted against
5K