7Block Labs
Decentralized Finance

ByAUJay

DeFi Protocol Consultancy and Decentralized Finance Consulting: Designing Governance Modules for Emergency Shutdowns

Summary: This guide distills emerging, field‑tested patterns for building emergency shutdown and circuit‑breaker governance into DeFi protocols. It translates real incidents and the latest DAO practices into concrete design blueprints, thresholds, runbooks, and integration tips you can ship.

Why you need an emergency shutdown that’s more than a big red button

Incidents in 2023–2025 made one thing clear: “pause” is not a monolith. Protocols that survived with minimal user harm combined layered technical levers (per‑asset freezes, pool‑level pauses, protocol‑wide halts) with precise governance routes (guardian multisigs, security councils, emergency DAOs) and automated triggers (circuit breakers and monitoring). MakerDAO’s Emergency Shutdown Module (ESM), Aave’s Guardian, Compound’s Pause Guardian, Curve’s Emergency DAO, and Balancer’s emergency subDAO illustrate orthogonal choices that you can adapt—each with different guarantees, delays, and scopes. (docs.makerdao.com)


Outcomes to design for

When you invoke emergency controls, aim for these properties:

  • Fast containment with least collateral damage (prefer “freeze this asset/market” before “pause all”). Aave’s v2/v3 stack now empowers its Guardian to freeze per‑asset and even stage a “liquidations grace” period to avoid cascading liquidations during recovery. (governance-v2.aave.com)
  • Exit availability for users (redeem/repay allowed even when mint/borrow is blocked). Compound’s Pause Guardian is intentionally limited to disabling mint/borrow/transfer/seize, never preventing redeem/repay; v2 unpause required governance, while v3 allows the guardian to unpause directly. (medium.com)
  • Verifiable, time‑bounded control, with timelocks for non‑emergency actions (e.g., Compound’s 2‑day minimum timelock for admin changes). (medium.com)
  • Predictable global unwind if governance is captured or a systemic fault occurs (Maker’s ESM “End.cage()” settlement path). Note: the minimum MKR stake required to fire ESM was raised to 300,000 MKR on July 25, 2024—plan accordingly. (vote.makerdao.com)

Governance building blocks: choosing the right “emergency actor”

You have three mature patterns. Many protocols combine them.

1) Guardian Multisig (Emergency Admin)

  • What it is: A community‑elected multisig with narrowly scoped emergency powers (pause/freeze, veto a malicious payload).
  • Where it works: Aave’s two Guardians—Protocol Emergency Guardian (EMERGENCY_ADMIN, 5‑of‑9) and Governance Emergency Guardian (veto powers)—are explicitly documented with named signers (risk, security, development providers and delegates). This separation avoids concentration and clarifies escalation paths. (aave.com)
  • Practical knobs:
    • Threshold and signer diversity (service providers + delegates).
    • Asset‑level vs pool‑level actions; consider a “FreezingSteward” so emergency actors can freeze rapidly without a full governance proposal. (governance-v2.aave.com)

2) Security Council (L2s and rollups)

  • What it is: A standing council empowered to execute emergency actions with high quorum, immediately; routine upgrades flow through delayed governance.
  • Where it works: Arbitrum’s 12‑member Security Council requires 9‑of‑12 for immediate Emergency Actions and must later publish a transparency report; non‑emergency actions also need 9‑of‑12 but add a delay so users can exit. Optimism augments its council’s Safe with LivenessGuard/Module to preserve quorum and prevent deadlock, plus a Deputy Guardian/Pause module for rapid action. (docs.arbitrum.foundation)
  • Practical knobs:
    • On Safe‑based councils, install liveness modules to evict inactive signers without dropping thresholds.
    • Define “transparency report” cadence post‑incident to maintain legitimacy. (docs.arbitrum.foundation)

3) Emergency DAO / subDAO

  • What it is: A smaller committee with explicit authority to “kill” or pause pools/gauges swiftly.
  • Where it works: Curve’s Emergency DAO halted CRV rewards to exploited pools in Aug 2023; Balancer’s emergency subDAO (4‑of‑7) can pause/enable recovery mode during a time‑boxed window, with funds always withdrawable. Some Balancer deployments hardcode a three‑month “emergency pause window,” after which the system becomes unstoppable. (cointelegraph.com)
  • Practical knobs:
    • Time‑limited pause windows to converge on unstoppable operation.
    • Automate pausing across chains via Safe modules as your footprint grows. (forum.balancer.fi)

Technical levers: freeze, pause, shutdown—know the differences

  • Soft freeze (per‑asset): Disable new borrows/mints or market listings; keep repay/redeem open. Aave’s freezing plus the Liquidations Grace Sentinel allows “grace periods” where no liquidations are processed, smoothing restarts. (governance-v2.aave.com)
  • Pool‑level pause: Halt swaps/add‑liquidity in affected pools while allowing withdrawals. Balancer’s emergency pause and “recovery mode” are designed to be non‑custodial and user‑exit‑friendly. (balancer.gitbook.io)
  • Protocol‑wide halt with settlement: Maker’s ESM ends the system and begins global settlement to ensure pro‑rata claims for Dai holders and vault users. Calibrate thresholds; as of July 25, 2024, the ESM min is 300k MKR. (docs.makerdao.com)

Best practice: Default to the smallest blast radius that achieves safety. Reserve global shutdown for governance capture or unrecoverable invariants.


Circuit breakers that actually work (beyond “pause()”)

  • ERC/EIP‑7265 (circuit breaker standard) proposes rate‑limiting or halting token outflows when a metric threshold is exceeded—useful to contain drains mid‑incident. While still under community discussion, the pattern is implementable today for your flows. (ethereum-magicians.org)
  • Synthetix pioneered decentralized and centralized circuit breakers: SIP‑65 suspends a synth when price deltas exceed thresholds; SIP‑231 formalizes an off‑chain triggered breaker with clear delta thresholds and observed downtime stats to guide tuning. Expect multiple short suspensions daily during volatility—plan UX and alerting accordingly. (sips.synthetix.io)
  • Consider time‑bucket outflow limiters (e.g., proposals like EIP‑5075) if your architecture can’t tolerate full reverts. (ethereum-magicians.org)

Calibration tip: Start with “soft breaker” thresholds that block growth but allow deleveraging; escalate to a “hard breaker” when oracle or invariant checks fail.


L2‑specific risk: sequencer downtime and fairness protections

On rollups, a sequencer halt can create asymmetric opportunities. Gate critical actions on the Chainlink L2 Sequencer Uptime Feed, and enforce a grace period after “sequencer up” before resuming liquidations/borrows. Chainlink documents reference implementations and event ordering guarantees to ensure your guard flips before dependent transactions execute. (docs.chain.link)

Practical pattern we deploy for clients:

  • Check the Uptime Feed’s “answer” and “startedAt”.
  • If down, block sensitive actions immediately; on recovery, require a grace window (e.g., 30–60 minutes) before resuming. Document this in your incident runbook so risk teams know when to unfreeze. (7blocklabs.com)

Security reviews repeatedly flag missing sequencer checks as a medium‑to‑high risk finding—automate tests around it. (github.com)


Automation: connect monitoring to narrow‑scoped authority

Manual multisigs are often too slow in atomic attacks. Combine high‑precision monitoring with narrowly scoped emergency rights:

  • Forta Attack Detector feed aggregates base alerts across the four attack stages (funding, prep, exploit, laundering) for higher precision and fewer false positives. Case studies show detections minutes before exploitation (e.g., Euler). This allows you to auto‑pause a single market or function when confidence is high. (docs.forta.network)
  • Wire monitors to responders via Ops tooling. OpenZeppelin’s Monitor (successor to Defender’s earlier workflows) supports alerting and automated responses; Forta documents one‑click subscriptions and Threat Detection Kits (DeFi, Stablecoin, Bridge, Governance) you can bootstrap in hours. (docs.openzeppelin.com)
  • Safety rail: Always route automation through a restricted “EmergencyPauser” role that can only toggle specific breakers or freeze specific assets, never move funds.

Incident‑driven examples: what worked, what changed

  • MakerDAO: Governance hardened the ESM in 2024, doubling the MKR threshold from 150k to 300k and simultaneously reducing the GSM pause delay to 16 hours for certain operations. If you rely on global settlement as a backstop, re‑assess adversary cost and detection windows. (vote.makerdao.com)
  • Aave: The Guardian paused GHO during a technical issue, then governance replaced the state with a freeze; later, Aave introduced the FreezingSteward and Liquidations Grace Sentinel for more graceful restarts. This is a model for “softer” emergency posture that prioritizes exits over binary halts. (governance-v2.aave.com)
  • Curve/Balancer: Curve’s Emergency DAO quickly ended rewards to compromised pools in 2023 to stop incentives from attracting new liquidity; Balancer codified an emergency subDAO, a three‑month pause window on new deployments, and in 2025 began enabling an automated pause module with Hypernative to react across multiple chains. (cointelegraph.com)
  • Rollups: Arbitrum’s council formalized a 9‑of‑12 immediate emergency threshold and post‑action transparency; Optimism shipped Safe extensions (LivenessGuard/Module, DeputyGuardian) so emergency governance stays live without lowering safety. If you build on L2s, mirror these patterns in your app‑level governance. (docs.arbitrum.foundation)

Blueprint: an emergency governance module you can ship this quarter

  1. Access control and wiring
  • Place upgrade and parameter authority behind a TimelockController or Governor+Timelock for normal ops; grant a separate Safe the “EmergencyPauser/Freezer” role (no upgrade powers). Use role modifiers that only allow emergency actors to call pause/freeze functions and, if needed, to set a liquidation grace period. (docs.openzeppelin.com)
  1. Roles and thresholds
  • Emergency Guardian: 5‑of‑9 or 4‑of‑7 with diverse signers (risk, security, development, delegates). Publish signer names/affiliations to users, with rotation/recusal policies.
  • Security Council (if applicable): Adopt LivenessGuard/Module equivalents; target 75% quorum for emergencies. Define deputy mechanisms for single‑purpose pausing. (specs.optimism.io)
  1. Levers and scopes
  • Per‑asset freeze, pool‑level pause, protocol‑wide pause, and shutdown (if your product warrants it).
  • Add a Liquidations Grace Sentinel so you can reopen markets safely without liquidation spikes. (governance-v2.aave.com)
  1. Circuit breakers (tiered)
  • Soft breaker: block mints/borrows on stale/deviating oracles and on L2 sequencer down; resume via automation after consecutive healthy checks.
  • Hard breaker: full pause on invariant breach or exploit detection; resume by governance or high‑threshold guardian after post‑mortem checklist.
  • Optional outflow limiter (EIP‑7265‑style) on treasuries/bridges. (ethereum-magicians.org)
  1. Monitoring and automation
  • Subscribe to Forta kits (DeFi, Stablecoin) and Attack Detector; integrate to on‑call and to an emergency pauser autotask. Keep the automation’s private key in a Safe Module with narrow rights. (docs.forta.network)
  1. Time‑boxing and unstoppable ethos
  • For AMM/LP systems, consider a finite “pause window” (e.g., 3 months from deployment) after which no one can pause, while recovery mode remains user‑protective. Document this in your docs to set expectations. (balancer.gitbook.io)
  1. Oracle and L2 hygiene
  • Enforce max staleness and deviation thresholds per asset; check L2 sequencer uptime + grace period before liquidations and sensitive price‑gated actions. Publish parameters and change process via governance. (docs.chain.link)
  1. Multi‑chain playbook
  • Mirror the guardian Safe on each chain with identical signer sets and thresholds. Pre‑approve pause/freeze calls on all deployments; dry‑run signing ceremonies. Compound’s cross‑chain guardian processes provide a usable template. (github.com)

Testing and drills: what to prove before mainnet

  • Unit/invariant tests: Verify that pause/freeze never locks user withdrawals/repayments and that settlement routines preserve invariants.
  • Fork simulations: Practice exploit playbooks; measure detection‑to‑pause latency with your monitoring stack.
  • Governance fire drills: Quarterly rotations and mock incidents for signers; prove liveness on all chains within your MTTD/MTTR budget.
  • Oracle and L2 tests: Simulate stale feeds and sequencer downtime; confirm soft breaker and grace period logic. (docs.chain.link)

KPIs your board will understand

  • Time to contain (TTC): from first high‑confidence alert to successful freeze/pause on the right scope.
  • User exit friction: percentage of users able to redeem/repay during emergency windows.
  • False pause rate: number of automated pauses not followed by governance confirmation (keep near zero by using high‑precision feeds like Forta’s Attack Detector). (forta.org)
  • Post‑incident transparency SLA: time from emergency action to public transparency report (if using a Security Council). (docs.arbitrum.foundation)

Pitfalls we still see in 2025–2026 audits

  • Monolithic “pause everything” that causes unnecessary loss of UX and composability when a per‑asset freeze would suffice.
  • Missing L2 sequencer checks leading to unfair liquidations on restart. (github.com)
  • Emergency keys that can upgrade code or move funds—keep emergency powers narrow and reversible.
  • No automation path (alerts go to email/Slack only). If your multisig needs 4–9 human signatures at 3 a.m., you’ve already lost minutes that matter.

Brief, in‑depth case walkthrough: Balancer’s evolving emergency stack

  • 2023: “Critical vulnerability” disclosure; emergency subDAO activated; users guided to exit affected pools; non‑custodial pause preserved exits. (blockworks.co)
  • Pattern hardening: emergency subDAO authorization, recovery mode enablement, and a time‑boxed pause window baked into docs and factories. (docs.balancer.fi)
  • 2025: Automated Safe modules (Hypernative) roll out across chains; when anomalies hit, pre‑wired modules can pause designated v6 pools automatically, while older pools without active pause windows remained exploitable—evidence that automation and time‑boxed permissions both matter. (forum.balancer.fi)

Takeaway: Ship automation and ensure new deployments inherit the right guards; accept that older deployments may require migration or sunset policies.


What to ship next if you’re starting today

  • Define emergency actor(s): Guardian multisig with 5‑of‑9 and documented signers; Security Council if you control an L2 or systemically critical infra. (aave.com)
  • Implement per‑asset freeze and liquidation grace; leave protocol‑wide pause for last resort. (governance-v2.aave.com)
  • Add tiered circuit breakers (soft/hard) and consider ERC‑7265 style outflow limits for treasuries/bridges. (ethereum-magicians.org)
  • Wire monitoring to action: Forta Attack Detector + OpenZeppelin Monitor to a restricted EmergencyPauser module; test on a fork with SLA targets. (docs.forta.network)
  • If deployed on L2s, enforce the Sequencer Uptime Feed checks with a grace period; document the policy in your docs and UI. (docs.chain.link)
  • Publish a public incident response policy: when you’ll pause, how you’ll communicate, and how/when you’ll unpause—plus a commitment to post‑mortems.

How 7Block Labs can help

We design and implement emergency governance tailored to your protocol’s risk profile—Guardian configuration, Safe modules, circuit‑breaker libraries, Forta/monitoring pipelines, and incident runbooks—validated by fork‑based red‑teaming. If your board wants provable resilience without “rug‑pull” admin optics, we’ll help you ship scoped, transparent controls that users can trust.


References for deeper dives:

  • MakerDAO ESM (docs + CLI) and July 25, 2024 exec raising ESM threshold to 300k MKR. (docs.makerdao.com)
  • Compound timelock and Pause Guardian semantics; OpenZeppelin’s Compound security policies (v2 vs v3 unpause). (medium.com)
  • Aave Guardians, freezing steward, and Liquidations Grace Sentinel. (aave.com)
  • Curve Emergency DAO actions (2023). (cointelegraph.com)
  • Balancer emergency pause and emergency subDAO; Hypernative module enablement (2025). (balancer.gitbook.io)
  • ERC/EIP‑7265 circuit breaker discussion; Synthetix circuit breaker SIPs (65, 231). (ethereum-magicians.org)
  • Chainlink L2 Sequencer Uptime Feed and best practices. (docs.chain.link)
  • Security‑council Safe extensions and operations (Optimism), Arbitrum Security Council constitution. (specs.optimism.io)

If you’d like a tailored emergency governance design review, 7Block Labs can map these patterns to your contracts, markets, and threat model—then help your team drill it until it’s muscle memory.

Like what you're reading? Let's build together.

Get a free 30‑minute consultation with our engineering team.

Related Posts

7BlockLabs

Full-stack blockchain product studio: DeFi, dApps, audits, integrations.

7Block Labs is a trading name of JAYANTH TECHNOLOGIES LIMITED.

Registered in England and Wales (Company No. 16589283).

Registered Office address: Office 13536, 182-184 High Street North, East Ham, London, E6 2JA.

© 2025 7BlockLabs. All rights reserved.