How to Use the Timelock?
Timelock is designed to be secure, simple, and accessible. This guide walks you through how to use the protocol step by step, whether you are a DAO, DeFi protocol, cross-chain bridge, or multisig user.
Getting Started
Access the Dashboard
Go to the Timelock web app.
Connect your wallet (Metamask, WalletConnect, or supported multisig).
Select Your Network
Timelock supports Ethereum, BSC, Polygon, Arbitrum, Optimism, Avalanche, and more.
Choose the chain and protocol you want to manage.
Choose an Operation
Submit a governance proposal
Adjust DeFi parameters
Execute a treasury transfer
Initiate a cross-chain operation
Core Features
1. Parsing & Interpretation
When you queue an operation, Timelock automatically decodes ABI data.
You will see:
Raw calldata (for developers)
Human-readable explanation (for non-technical users)
This ensures everyone understands what the transaction is doing.
2. Queue & Delay
Every operation goes into the Timelock queue.
You can set different delay times based on governance rules (e.g., 24h for large transfers, 12h for parameter changes).
Queue states: Queued, Pending, Executed, Cancelled, Expired.
This gives the team/community reaction time before execution.
3. Monitoring & Alerts
While waiting in the queue, operations are automatically scanned for risks.
Examples:
Large fund movements
Role or permission changes
Cross-chain validator swaps
Alerts are sent via email, dashboard, and collaboration tools.
This ensures no suspicious activity goes unnoticed.
4. Cancel & Emergency Intervention
If an operation looks malicious or wrong, you can cancel with one click.
Linked to the monitoring engine, Timelock will also recommend cancellation for high-risk actions.
All cancelled actions are logged for auditing.
This is your last line of defense.
5. Execution
Once the delay period ends and no cancellation occurs, the operation executes automatically.
You will receive a confirmation and audit log.
Safe, transparent, and verifiable execution.
Typical Use Cases
DAOs – execute proposals with a safety buffer.
DeFi Protocols – adjust interest rates, fees, or parameters with monitoring.
Treasury Management – secure large token transfers.
Cross-Chain Bridges – protect validator or contract upgrades.
Multisig Wallets – add an extra security layer against insider risks.
Best Practices
Always set longer delays for high-value or high-impact operations.
Use multi-channel alerts to keep all stakeholders informed.
Encourage community members to review pending operations.
Cancel immediately if anything looks unusual.
With Timelock, every critical action becomes transparent, reviewable, and secure. You are in control — not the attackers.
Last updated