Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Voting Vault

A Voting Vault is a specialized smart contract that securely custodies tokens while preserving their underlying governance rights, enabling complex delegation strategies.
Chainscore © 2026
definition
DEFINITION

What is a Voting Vault?

A Voting Vault is a smart contract architecture that enables the secure delegation of voting power from token assets without requiring the physical transfer of those assets.

In blockchain governance, a Voting Vault is a specialized smart contract that allows a token holder to delegate their voting rights while retaining full custody of their underlying assets. This solves a critical security and usability problem in DeFi governance, where users are often forced to choose between participating in protocol decisions and using their tokens for other yield-generating activities like lending or staking. By locking voting power into a vault, users can vote on proposals without moving tokens from their primary wallets or integrated DeFi protocols.

The technical mechanism involves a non-transferable representation of voting power. When a user deposits tokens into a compatible protocol (e.g., a lending market), they can simultaneously delegate the associated governance rights to a Voting Vault. The vault mints a derivative token—often called voting power receipts—that is locked and used solely for casting votes in the governance system. This separation of economic utility from governance utility is a foundational concept for composable governance, enabling more sophisticated and secure delegation strategies.

A primary use case is delegated voting with collateral. A user can supply ETH as collateral in a lending protocol like Aave, earn interest, and still use the voting power of that deposited ETH to participate in Aave governance via a Voting Vault. This prevents the risky practice of physically transferring governance tokens to a delegate's wallet. Prominent implementations include Aave's aToken-based vaults and Compound's governance system, which inspired this architectural pattern to enhance voter participation and capital efficiency.

From a security perspective, Voting Vaults mitigate key risks. Since the underlying assets never leave their source protocol, they are not exposed to additional smart contract risk within the vault itself beyond the initial delegation action. The design also prevents double-spending of voting power; the same tokenized asset cannot be used to vote in two different vaults or governance systems simultaneously. This creates a verifiable and transparent ledger of delegated rights on-chain.

The evolution of Voting Vaults points toward more complex governance middleware. Future developments may include time-locked delegations, conditional voting strategies based on market data, and vaults that aggregate power from multiple asset types. This architecture is essential for the maturation of DAO tooling, as it allows for professional delegation and voter participation without compromising the security or utility of locked capital in the expanding DeFi ecosystem.

how-it-works
DEFINITION

How a Voting Vault Works

A Voting Vault is a smart contract architecture that enables token holders to delegate their governance power to a designated representative without transferring the underlying assets.

A Voting Vault is a smart contract design pattern that separates governance power from asset custody, allowing users to delegate their voting rights while retaining full control of their tokens. This is achieved by locking tokens into a specialized vault contract, which then issues a non-transferable representation of the voting power—often called voting receipts or voting power tokens. The core innovation is delegation without transfer, mitigating the custodial risk and trust assumptions inherent in simply sending tokens to a delegate's wallet. This mechanism is foundational for secure, flexible on-chain governance systems.

The technical workflow typically involves a user approving and depositing their governance tokens (e.g., ERC-20 tokens) into the vault contract. Upon deposit, the vault mints a corresponding amount of a non-transferable voting power token to the user's address. The user can then delegate these voting power tokens to any Ethereum address, such as a trusted community member, a multisig wallet, or a specialized delegate contract. Critically, the original tokens remain locked and secured within the vault; only the right to vote on proposals is delegated. This separation ensures that even if a delegate's address is compromised, the attacker cannot steal the underlying assets.

Voting Vaults enable advanced governance strategies like vote delegation to smart contracts. A delegate can run a complex, automated strategy contract that votes based on predefined logic or off-chain data via oracles. Furthermore, vaults can support cross-protocol governance, where a single vault system can manage voting power for multiple, separate governance tokens, allowing a delegate to represent a user across an entire ecosystem. This architecture also facilitates the creation of delegation markets and liquid delegation, where voting power can be programmatically managed or temporarily lent, though the non-transferable nature of the core receipts prevents outright sale.

From a security perspective, Voting Vaults significantly reduce slashable risk compared to liquid staking or direct transfers. Since the underlying assets are non-custodial and never leave the user's ultimate control, the delegate cannot maliciously or accidentally lose them. The primary risk shifts to the smart contract risk of the vault implementation itself. Well-audited vaults, like those built on established standards such as OpenZeppelin's Governor with Vault extensions, are considered best practice. This model has been adopted by major DAOs and DeFi protocols to create more resilient and participatory governance frameworks.

key-features
ARCHITECTURE

Key Features of Voting Vaults

A Voting Vault is a smart contract primitive that enables the secure, non-custodial delegation of governance power from a user's assets to a third party, without transferring the underlying assets themselves.

01

Non-Custodial Delegation

The core innovation of a Voting Vault is that it allows a user to delegate their governance rights (e.g., voting power, proposal rights) while retaining full custody of their underlying assets. The vault acts as a verifiable claim on the user's assets, proving the delegatee's right to vote with them, but the assets never leave the user's wallet. This eliminates the custodial risk associated with transferring tokens to a delegate or staking contract.

02

Asset Agnosticism

Voting Vaults are designed to be protocol-agnostic. A single vault implementation can be used to wrap and delegate voting power from a wide variety of assets, including:

  • Liquid Staking Tokens (e.g., stETH, rETH)
  • Yield-Bearing Tokens (e.g., cTokens, aTokens)
  • LP Positions (e.g., Uniswap V3 NFTs)
  • Governance Tokens themselves This flexibility allows delegates to aggregate voting power from a user's entire DeFi portfolio through a single, unified interface.
03

Composability & Integration

Voting Vaults are built as composable primitives that integrate directly with on-chain governance systems. They function by:

  • Registering with a governance contract (like a Governor).
  • Exposing a standard interface (getVotingPower) that the governance contract calls to query a user's voting power at a specific block.
  • This allows governance systems to seamlessly recognize and count votes from vaulted assets without modifying their core logic, enabling cross-protocol governance aggregation.
04

Security & Verifiability

Security is paramount as vaults hold verifiable claims to user assets. Key security features include:

  • Immutable Logic: Core vault logic is non-upgradable to prevent malicious changes.
  • Transparent State: All delegations are recorded on-chain and publicly auditable.
  • No Asset Movement: Since assets aren't transferred, the attack surface is significantly reduced compared to custodial models.
  • Time-locked Delegations: Some implementations allow users to set delegation expirations or lock-up periods, providing an extra layer of control and security.
05

Use Case: Delegate Voting Power

The primary use case is enabling sophisticated delegate ecosystems. Users can delegate the voting power of their complex, yield-generating positions to a trusted expert or DAO without sacrificing yield or custody. For example, a user holding stETH, Aave aTokens, and a Uniswap V3 position could delegate all associated governance rights to a single delegate via their respective vaults, empowering professional delegates with diversified, representative voting power.

06

Technical Implementation (ERC-5805 & 6372)

The standard framework for Voting Vaults is defined by EIP-5805 (VotingVault) and EIP-6372 (Clock). Key technical components:

  • VotingVault Contract: Holds delegation logic and state, returns voting power via getVotingPower(address user, uint256 blockNumber).
  • Governance Integration: A Governor contract calls the vault to check power, using a standardized clock (EIP-6372) for timekeeping instead of block numbers.
  • Registry Pattern: Often, a central registry manages which vaults are approved for use within a governance system, ensuring security and compatibility.
examples
VOTING VAULT IMPLEMENTATIONS

Real-World Examples & Protocols

Voting Vaults are implemented by governance frameworks to enable secure, delegated voting power. Here are key protocols and their approaches.

use-cases
VOTING VAULT

Primary Use Cases

A Voting Vault is a smart contract that securely holds and delegates governance power, enabling token holders to participate in on-chain decision-making without moving their assets. These are its core applications.

01

Delegated Governance

Enables liquid democracy by allowing token holders to delegate their voting power to a representative or themselves without transferring the underlying asset. This separates economic stake from governance rights, reducing risk and increasing participation.

  • Key Feature: Non-custodial delegation.
  • Example: A user can delegate their COMP voting power to a trusted community member while still using the tokens for lending on Compound.
02

Secure Voting Power Aggregation

Aggregates voting power from multiple sources (e.g., staked tokens, LP positions, vesting schedules) into a single, verifiable unit. This allows for complex governance strategies and participation in multiple protocols simultaneously.

  • Mechanism: The vault acts as a unified interface for on-chain identity.
  • Use Case: A DAO can use a vault to combine voting power from its treasury's staked ETH and its members' locked tokens to vote on a proposal.
03

Composability with DeFi

Allows governance tokens to be used productively in DeFi (e.g., as collateral for loans, in liquidity pools) while their voting power remains active. This solves the liquidity vs. governance dilemma.

  • Core Benefit: Unlocks capital efficiency.
  • Example: A user can supply their AAVE tokens as collateral on Aave to borrow assets, while their voting power in the Aave DAO is still delegated via the vault.
04

Time-Locked Voting & Commitment

Enables vote escrow models, where voting power is weighted by the duration tokens are locked in the vault. This aligns long-term incentives and is foundational for curve wars and protocol-owned liquidity.

  • Mechanism: Longer lock-ups grant exponentially higher voting power.
  • Protocol Example: Curve Finance's veCRV model, where CRV tokens are locked in a vault to receive boosted rewards and governance influence.
05

Cross-Protocol Governance

Facilitates participation in the governance of multiple, interconnected protocols from a single position. A vault can represent a basket of governance rights, enabling coordinated meta-governance.

  • Strategy: A vault holding INDEX tokens could vote on Index Coop proposals while also using those tokens to vote on underlying component protocols like Aave or Uniswap.
  • Benefit: Reduces transaction overhead for managing diverse governance portfolios.
06

Treasury & Institutional Management

Provides a secure, transparent, and programmable framework for DAO treasuries and institutional investors to manage their governance participation. It enables multi-signature control and clear audit trails for all voting actions.

  • Key Feature: Separation of asset custody and voting execution.
  • Application: A DAO's multi-sig can deposit treasury assets into a vault, allowing designated delegates to vote without direct access to the treasury funds.
security-considerations
VOTING VAULT

Security Considerations & Risks

A Voting Vault is a smart contract that holds assets to generate voting power in governance systems, but isolates them from direct protocol risk. This section details the critical security models and attack vectors associated with their design.

01

Custodial vs. Non-Custodial Models

The fundamental security distinction is who controls the underlying assets.

  • Custodial Vaults: A trusted third party (e.g., a DAO multisig) holds the assets. This introduces counterparty risk and requires high trust in the custodian's security and integrity.
  • Non-Custodial Vaults: Assets remain in the user's wallet or a permissionless smart contract. Security shifts to smart contract risk and the correctness of the vault's delegation logic, eliminating trusted intermediaries.
02

Smart Contract & Implementation Risk

As with any DeFi primitive, the vault's code is the primary attack surface.

  • Logic Bugs: Flaws in the delegation, withdrawal, or power calculation functions can lead to lost votes or locked funds.
  • Upgradeability Risks: If the vault uses proxy patterns, a compromised admin key could upgrade to malicious code.
  • Integration Risks: The vault must securely interact with external protocols (e.g., staking contracts, oracles). A vulnerability in an integrated protocol can cascade to the vault.
03

Governance Attack Vectors

Voting Vaults create new dimensions for governance manipulation.

  • Power Inflation Attacks: An attacker could exploit the vault's rules to artificially inflate their voting power without proportional economic stake (e.g., via flash loans or re-staking).
  • Vote Delegation Hijacking: If delegation is mutable, a compromised private key could allow an attacker to redirect voting power.
  • Timing Attacks: Manipulating the snapshot mechanism for voting power calculation to gain disproportionate influence.
04

Economic & Collateral Risks

The assets deposited in a vault are often not at direct protocol risk, but remain exposed to other financial hazards.

  • Underlying Asset Volatility: The value of the delegated voting power fluctuates with the collateral asset's price.
  • Slashing Risk: If the vault delegates to a slashed validator (in PoS systems) or a penalized service, the underlying assets can be partially lost.
  • Liquidity Risk: Assets may be locked for a duration, preventing withdrawal during market stress.
05

Centralization & Admin Key Risks

Many vault implementations retain administrative functions, creating central points of failure.

  • Pausability: An admin may have the ability to pause withdrawals or voting, which can be used maliciously or become a single point of failure if compromised.
  • Parameter Changes: Control over fees, whitelists, or supported assets could be abused.
  • Best Practice: Use timelocks and decentralized multisigs for any admin functions to mitigate these risks.
06

Verification & Audit Reliance

Assessing vault security requires due diligence on several fronts.

  • Audit Reports: Reliance on audits from reputable firms is critical, but not a guarantee. Review the scope and severity of findings.
  • Formal Verification: Some projects use mathematical proofs to verify critical contract properties.
  • Bug Bounties: An active, well-funded bug bounty program is a strong indicator of a project's security posture.
  • Time in Production: A vault with a long, uneventful track record (e.g., Yearn's yVaults) provides empirical evidence of robustness.
DELEGATION MECHANISMS

Voting Vault vs. Direct Delegation

A comparison of two primary methods for delegating voting power in on-chain governance, focusing on custody, flexibility, and security.

FeatureVoting VaultDirect Delegation

Asset Custody

Tokens remain in user's wallet

Tokens are transferred to delegate's wallet

Voting Power Source

Non-custodial, verifiable claim

Direct token balance in delegate's wallet

Delegation Flexibility

Can delegate to multiple delegates for different assets

Typically one delegate per token or wallet

Revocation Latency

Immediate, self-custodial action

Requires delegate to return tokens or a new transaction

Slashing Risk

None (no token transfer)

Present (tokens are custodied by delegate)

Gas Cost for Setup

Higher (one-time contract interaction)

Lower (simple ERC-20 approval/transfer)

Composability

High (vault logic can be integrated by other protocols)

Low (simple balance-based)

Typical Use Case

Sophisticated DAOs, multi-asset governance

Simple token voting, initial implementations

VOTING VAULT

Frequently Asked Questions (FAQ)

Essential questions and answers about Voting Vaults, a core mechanism for decentralized governance and tokenized voting power.

A Voting Vault is a smart contract that allows a user to deposit collateral assets to mint a derivative token representing voting power, without transferring the underlying asset's custody. It works by accepting deposits of assets like ETH, stETH, or ERC-20 tokens and issuing a corresponding amount of voting tokens (e.g., veTokens) that can be used in on-chain governance. The underlying assets remain in the vault, often earning yield, while the derived voting power is delegated to the user or their chosen delegate. This mechanism separates economic utility from governance rights, enabling capital-efficient voting.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team