I initially posted on the Discord channel but sharing also here for additional visibility.
Maybe you know? Maybe you’ve done this already or know some creative workarounds?
Gnosis Safe offers
m-of-n pattern but does not allow a granular control.
For example, 3 dudes from Colombia office can collude and leave the entire company out of luck.
Ideally, we would like to ensure that such collusion cannot take place, because some of the confirmations have to come from the members of another group.
I believe that is a sufficient level of security, decentralisation, redundancy.
Nested multisig (OLD)
Aragon Association Multisig: Luis, Jorge, Community
Community: 6-of-9 reputable people in the ETH space
Using OLD multisig I was able to initiate a transaction and then using Safe I was able to
confirmTransation but that is far from ideal.
Wallet Connect as a workaround?
BUT: Facing some issues…
- Upper left: 0x76eE via Wallet Connect
- Bottom left: 0x76eE not logged in.
- Upper right: 0x823C logged in via MetaMask
- Bottom right: 0x823C logged in via MetaMask, using Wallet Connect Safe App
0x76eE is 2-of-n, one of the members is 0x823C.
- Connect via Wallet Connect.
- Go to Apps --> Wallect Connect
- Paste the connection string
- New Transaction --> Send Funds
- Popup bottom right 0x823C Wallet Connect
- Confirm in upper right 0x823C
Now… The confirmation from 0x823C is not propagated. Bottom left 0x76eE reloading. Connecting via MetaMask. The signature from 0x823C is not visible in the transaction list. In other words - nested Safes do not receive notification about the transaction to be signed - so it doesn’t work in practice
If I make the Final Safe to be (1-of-n) then Wallet Connect to another Safe works - this is because transaction can be executed instantly with a single confirmation, lack of notification to other Safes is not an issue.
Other workarounds possible?
Tapping into the power of the crowdsourcing and community… Maybe you will know?
Or maybe the existing flow with Wallet Connect is ze best, just the Transaction Service needs some finetuning to properly propagate such signatures?
Related: EIP 1271
Signature data that should be verified. Can be ECDSA signature, contract signature (EIP-1271) or approved hash.