|
1 |
| -# BIT-0000: Title of BIT |
| 1 | +# BIT-0000: Council Dissolution of dTAO Subnet |
2 | 2 |
|
3 |
| -- **BIT Number:** 0000 |
4 |
| -- **Title:** Title of the BIT |
5 |
| -- **Author(s):** [Name(s) and contact information] |
6 |
| -- **Discussions-to:** [URL for discussion thread] |
| 3 | +- **BIT Number:** 0006 |
| 4 | +- **Title:** Council Dissolution of dTAO Subnet |
| 5 | +- **Author(s):** CapriciousSage |
7 | 6 | - **Status:** Draft
|
8 |
| -- **Type:** Core | Subtensor | Networking | Interface | Meta | Informational |
9 |
| -- **Created:** [Date] |
10 |
| -- **Updated:** [Date] |
11 |
| -- **Requires:** [BIT number(s) if applicable] |
12 |
| -- **Replaces:** [BIT number(s) if applicable] |
| 7 | +- **Type:** Core |
| 8 | +- **Created:** 28/02/2025 |
| 9 | +- **Updated:** 28/02/2025 |
13 | 10 |
|
14 | 11 | ## Abstract
|
15 | 12 |
|
16 |
| -A short (~200 words) description of the issue being addressed and the proposed solution. |
| 13 | +Introduction of emergency/last resort governance powers to the Root Network Validator Council to dissolve a dTAO Subnet to avoid network/systemic risk |
17 | 14 |
|
18 | 15 | ## Motivation
|
19 | 16 |
|
20 |
| -The motivation section should clearly explain why the existing protocol specification is |
21 |
| -inadequate to address the problem that the BIT solves. This is critical for BITs that want to |
22 |
| -change the Bittensor protocol. It should clearly explain why the solution outlined in the BIT |
23 |
| -is beneficial to the Bittensor ecosystem. |
| 17 | +While the "lolocaust" has been an effective way of dealing with unwanted/dangerous subnet economics (ponzi), it does not allow for the removal of unwanted/dangerous subnets themselves (malware, CSAM, other illicit content, etc). As such, a mechanism to remove subnets that present a significant risk to the broader ecosystem is required. |
24 | 18 |
|
25 | 19 | ## Specification
|
26 | 20 |
|
27 |
| -The technical specification should describe the syntax and semantics of any new feature or |
28 |
| -proposed change. The specification should be detailed enough to allow for implementation |
29 |
| -without needing to interpret the proposal’s intent. |
| 21 | +- Addition of new governance capabilities to allow for senate members to create and vote on proposals that, should the proposal pass by a super-majority, will automatically dissolve a dTAO-subnet. |
| 22 | +- Dissolution process would also need to include the forced fire-sale of outstanding dtao tokens back to TAO utalising the existing pool liquidity. |
| 23 | + -- It is vital that the dtao fire-sale all done at the same price, completed in a manner that equalises the price impact among all eligible participants. |
| 24 | + -- The applicable dTAO tokens in the subnet owner's wallet should be excluded from this fire-sale process ('burnt') |
| 25 | +- To prevent bad actors from 'rugging' the subnet during the governance window, certain activities on the subnet should be frozen once the governance proposal is submitted |
| 26 | + -- These include the LP (preventing buying/selling), token issueance (miner/vali/subnet owner rewards), and miner/vali registrations). |
| 27 | +- To avoid abuse (unwarranted dissolution proposals), the governance proposer should be required to lock an amount of tao equal to the registration cost of the subnet. |
| 28 | +- Due to the lack of a "No with Veto" mechanic, voting results would need to accommoate three outcomes (Yes/Split Vote/No |
| 29 | + -- Yes (66% Super Majority in support): Subnet is dissolved, locked tokens returned to proposer |
| 30 | + -- Split Vote (34% - 65% in support): Subnet is not dissolved, locked tokens returned to proposer |
| 31 | + -- No (33% or less in support): Subnet is not dissolved, locked tokens are recycled |
30 | 32 |
|
31 | 33 | ## Rationale
|
32 | 34 |
|
33 |
| -This section describes why particular design decisions were made. It should address alternative |
34 |
| -designs and why they were not chosen, and should discuss the potential impact of the proposal |
35 |
| -on the existing system. |
| 35 | +Subnets being used to distribute malicious or illicit material (malware, CSAM, etc) pose an exestensial risk to the entire network. It is vital that the network have a manner in which to remove these threats. Additionally, should certain subnets become abandoned, it may be necessary to remove these abandoned subnets to reduce unneccessary chain bloat/overhead. |
36 | 36 |
|
37 | 37 | ## Backwards Compatibility
|
38 | 38 |
|
39 |
| -All BITs that introduce backward incompatibilities must include a section describing these |
40 |
| -incompatibilities and their severity. The BIT must explain how the author proposes to deal with |
41 |
| -these incompatibilities. BIT submissions without a sufficient backward compatibility treatise |
42 |
| -may be rejected outright. |
| 39 | +It is unknown whether the introduction of additional capabilities to the governance module (including integrating with locking tokens when submitting a dissolution proposal) may have backwards compatiblity issues with the existing governance framework. |
43 | 40 |
|
44 | 41 | ## Reference Implementation (Optional)
|
45 | 42 |
|
46 |
| -If applicable, include a link to a reference implementation that demonstrates the feasibility |
47 |
| -of the proposal. This implementation may be partial or fully complete. |
| 43 | +The Cosmos SDK provides a well known example of governance proposals requiring a deposit, which is then burnt in the event of a "No with Veto" outcome |
48 | 44 |
|
49 | 45 | ## Security Considerations
|
50 | 46 |
|
51 |
| -All BITs should consider the security implications of their proposals. This section should |
52 |
| -address potential attack vectors, vulnerabilities, and how the proposed changes affect the |
53 |
| -overall security of the Bittensor protocol. |
| 47 | +The existance of a dissolution procedure is not a panacea against abuse. Senate members may have vested interests (or lack of interest in voting) that may prevent the successful dissolution of a subnet where it may be otherwise needed. However, this is always a risk in any decentralised ecosystem and relies on network participants showing wisdom in selecting which validator to delegate to. |
54 | 48 |
|
55 | 49 | ## Copyright
|
56 | 50 |
|
|
0 commit comments