How to Use the Timelock?

Timelock is designed to be secure, simple, and accessible. This guide walks you through how to use the protocol step by step, whether you are a DAO, DeFi protocol, cross-chain bridge, or multisig user.

Getting Started

  1. Access the Dashboard

    • Go to the Timelock web app.

    • Connect your wallet (Metamask, WalletConnect, or supported multisig).

  2. Select Your Network

    • Timelock supports Ethereum, BSC, Polygon, Arbitrum, Optimism, Avalanche, and more.

    • Choose the chain and protocol you want to manage.

  3. Choose an Operation

    • Submit a governance proposal

    • Adjust DeFi parameters

    • Execute a treasury transfer

    • Initiate a cross-chain operation

Core Features

1. Parsing & Interpretation

  • When you queue an operation, Timelock automatically decodes ABI data.

  • You will see:

    • Raw calldata (for developers)

    • Human-readable explanation (for non-technical users)

This ensures everyone understands what the transaction is doing.

2. Queue & Delay

  • Every operation goes into the Timelock queue.

  • You can set different delay times based on governance rules (e.g., 24h for large transfers, 12h for parameter changes).

  • Queue states: Queued, Pending, Executed, Cancelled, Expired.

This gives the team/community reaction time before execution.

3. Monitoring & Alerts

  • While waiting in the queue, operations are automatically scanned for risks.

  • Examples:

    • Large fund movements

    • Role or permission changes

    • Cross-chain validator swaps

  • Alerts are sent via email, dashboard, and collaboration tools.

This ensures no suspicious activity goes unnoticed.

4. Cancel & Emergency Intervention

  • If an operation looks malicious or wrong, you can cancel with one click.

  • Linked to the monitoring engine, Timelock will also recommend cancellation for high-risk actions.

  • All cancelled actions are logged for auditing.

This is your last line of defense.

5. Execution

  • Once the delay period ends and no cancellation occurs, the operation executes automatically.

  • You will receive a confirmation and audit log.

Safe, transparent, and verifiable execution.

Typical Use Cases

  • DAOs – execute proposals with a safety buffer.

  • DeFi Protocols – adjust interest rates, fees, or parameters with monitoring.

  • Treasury Management – secure large token transfers.

  • Cross-Chain Bridges – protect validator or contract upgrades.

  • Multisig Wallets – add an extra security layer against insider risks.

Best Practices

  • Always set longer delays for high-value or high-impact operations.

  • Use multi-channel alerts to keep all stakeholders informed.

  • Encourage community members to review pending operations.

  • Cancel immediately if anything looks unusual.


With Timelock, every critical action becomes transparent, reviewable, and secure. You are in control — not the attackers.

Last updated