Governance Architecture
The governance architecture of ZK DAO is designed to separate authority, decision-making, and execution, while keeping all sensitive information private. Each sub-layer has a clearly defined role and interacts with others only through verifiable proofs.
This architecture ensures that governance is deterministic, enforceable, and confidential.
Architectural Overview
ZK DAO governance is composed of four internal layers:
Identity & Membership Layer
Proposal & Rule Definition Layer
Voting & Finalization Layer
Execution Authorization Layer
Each layer enforces constraints that the next layer depends on, forming a one-way, non-bypassable pipeline.
1. Identity & Membership Layer (Governance Context)
This layer defines who is allowed to participate in governance.
Key responsibilities:
Issuing governance-scoped zkIDs
Encoding roles and permissions
Enforcing role constraints at proposal creation and voting
Properties:
No public member lists
No address-role mappings
Membership proofs are scoped to governance context
This ensures that only authorized participants can influence governance outcomes.
2. Proposal & Rule Definition Layer
This layer defines what can be decided and how.
Each proposal includes:
Action type (swap, withdraw, allocate, config change)
Required roles to propose and vote
Voting model (token, role, stake, hybrid)
Quorum and threshold definitions
Execution constraints and expiration
Design choices:
Proposal rules are explicit and immutable once created
Proposal parameters may be hidden or partially revealed
All constraints are enforced inside circuits and contracts
This prevents rule manipulation during the voting process.
3. Voting & Finalization Layer
This layer handles decision-making without visibility.
Key responsibilities:
Accepting ZK voting proofs
Enforcing voting weight and eligibility
Preventing double voting
Aggregating votes privately
Determining final outcome
Important properties:
No interim vote counts
No visible quorum progress
No voter identity exposure
Finalization outputs:
Approved / Rejected / Expired state
A cryptographic proof of correctness
4. Execution Authorization Layer
This layer bridges governance and execution.
Responsibilities:
Binding finalized proposals to execution rules
Defining required execution thresholds
Accepting ZK multisig approval proofs
Locking execution to a single valid path
Properties:
Execution is impossible without finalized governance
Execution thresholds cannot be bypassed
Signer identities remain private
This layer ensures that governance decisions are enforced, not just recorded.
Governance Data Flow
A participant proves authorization to create a proposal
Proposal rules are fixed and published
Eligible members vote using ZK proofs
The system finalizes the proposal privately
Execution authorization is unlocked
Execution proceeds only with valid ZK multisig proofs
At no point is sensitive governance data revealed.
Governance Isolation Guarantees
The architecture guarantees that:
Governance cannot directly move funds
Execution cannot occur without governance approval
Settlement cannot occur without execution authorization
No layer can be skipped or bypassed
Each layer is isolated by cryptographic constraints.
Last updated