DOCS

Index Protocol smart contracts

The readme document in the Reserve Index Protocol Github repository provides an overview of the protocol's smart contract architecture and implementation details.

The material below provides a technical tour of the protocol's contracts, bridging the high-level system design with on-chain implementations.

The Protocol Operations chapter explains how these contracts work together to provide the core functionality of the protocol.

System architecture

The table below groups the protocol's contracts into functional layers and highlights the role each set of contracts plays within the system.

Layer Core contracts Purpose
DAO infrastructure FolioDAOFeeRegistry, FolioVersionRegistry Collect protocol-wide fees and whitelist Folio implementations / deployers
Index (“Folio”) layer Folio (ERC-20), FolioProxy Represents the basket and embeds the rebalance-auction engine; proxy pattern allows controlled upgrades
Governance layer FolioGovernor Dual-timelock governance (slow & fast) that execute proposals and manage rebalances
Staking / voting layer StakingVault Escrows vote-locked governance tokens and streams rewards while providing voting weight

Governance roles

Index DTFs employ a modular governance structure composed of scope-constrained onchain roles. Governance can be flexibly customized by assigning different actors or contracts (e.g., DAOs, multi-sigs, EOAs) to each role.

Each role is deliberately sandboxed to the smallest set of function calls and parameter ranges needed for its mandate, and every high-impact action must pass through a timelock or hard-coded ceiling. These guardrails guarantee that no single key can abuse the system—another role (or broader governance) always has time and authority to intervene.

1. Admin

The Admin is the primary admin of the DTF. There should really only ever be 1 Admin.

Expected Actor

A DAO that operates via the supplied FolioGovernor.sol and TimelockController.sol contracts.

DAO power should be sourced from the StakingVault.sol contract. The main reason for this is that the StakingVault has the ability to collect multiple different reward tokens and distribute them to stakers pro-rata over time in an MEV-resistant manner. Any ERC20 can be configured as the deposit token for the StakingVault at deployment.

Abilities

  • Add / remove assets to / from the basket
  • Set fees & fee recipients
  • Set auction length
  • Set the auction delay (delay between when an auction is approved and when it can be permissionlessly launched)
  • Assign all roles

Limitations

All actions are gated by a timelock (default 48 h). Cannot bypass hard-coded parameter ceilings (e.g., max 10 % annual TVL fee) and cannot seize collateral directly.

2. Auction Approver

The Auction Approver is responsible for configuring auctions for execution.

Expected Actor

The same DAO that acts as the Admin should also take on the role of Auction Approver, and the default deployment configuration in Register is exactly this.

However, having the Auction Approver as a separate role gives the Admin the optionality to permission a smaller set of trusted actors to approve auctions. This would allow the DTF to move faster on basket changes, but comes with the added risk of the DTF being considered a security (due to the nature of the asset selection being managed by a small group of permissioned actors) and mint access being geo-blocked on Register.

Abilities

  • Configure an auction for execution. Each auction definition has the following parameters at approval:
  • Sell Token: the token to be sold by the DTF
  • Buy Token: the token to be bought by the DTF
  • Expected Volatility: the amount of price movement that is expected in the Sell Token:Buy Token pairing. The Auction Approver can select between 3 options: Low, Medium, and High.
  • Time To Live (TTL): How long (in seconds) an auction can exist in an APPROVED state until it can no longer be opened. This value must be longer than the DTF-configured Auction Delay if the auction is intended to be permissionlessly available.

Limitations

May only define auctions within pre-set volatility and TTL ranges. Cannot alter fees, basket weights, or governance itself.

3. Auction Launcher

The Auction Launcher is responsible for launching an approved auction and providing more accurate pricing information for it.

A DTF is NOT required to have any Auction Launchers, as auctions can be launched permissionlessly (as long as the DTF and auctions are configured correctly).

Expected Actor

Because this role takes on a more ministerial job, it can be held by a trusted multisig or EOA.

While any Auction Launcher should be trusted, they can only modify the pricing information within the bounds set by the Auction Approver, thus limiting the amount of damage from mistakes or a rogue actor.

Abilities

  • Launch auctions
  • Kill auctions
  • When opening an auction, optionally alter parameters of the auction within the approved ranges

Limitations

Can tweak start/end prices but only inside the bands approved by the Approver. Cannot extend an auction’s TTL or change the sell/buy tokens.

4. Brand Manager

The Brand Manager is responsible for updating the Register UI with the correct social media links and token media (logo, banner).

Expected Actor

A trusted multisig or EOA that is responsible for the branding and marketing of the DTF.

Abilities

  • Update the DTF website, Twitter, Farcaster, and Telegram links that get displayed on Register
  • Update the DTF logo and banner that get displayed on Register

Limitations

Limited to UI metadata (links, logos). Has zero permissions over assets, fees, or auctions.

5. Guardian

The Guardian is responsible for vetoing malicious governance proposals.

Expected Actor

A trusted multisig or EOA that is ready and willing to act quickly to prevent malicious governance proposals from being executed.

Abilities

  • Veto governance proposals

Limitations

Single-purpose veto (cancel) on queued governance proposals; cannot propose or execute anything itself. Power sunsets automatically if a quorum of stakers votes to revoke the role.

Contract addresses

Base Deployments (Chain ID: 8453)

Contract Address
GovernanceDeployer 0x6a66E6E209C7120819cC033d9397E5022C22C872
FolioDeployer 0xb8469986840bc9b7Bb101C274950c02842755911
RsrToken 0xaB36452DbAC151bE02b16Ca17d8919826072f64a
FolioFeeRegistry 0x0262E3e15cCFD2221b35D05909222f1f5FCdcd80
FolioVersionRegistry 0xA665b273997F70b647B66fa7Ed021287544849dB
Folio (Implementation) [1.0.0] 0x391BC46eca06CB31fb5eFff51bfD3804B53F43F8
Folio (Implementation) [2.0.0] 0x0479999e166c470251c6bF0b08Fad1a147589f37

Ethereum Deployments (Chain ID: 1)

Contract Address
GovernanceDeployer 0xE926577a152fFD5f5036f88BF7E8E8D3652B558C
FolioDeployer 0xaafb13a3df7cE70c140E40c959D58Fd5Cc443Cba
RsrToken 0x320623b8E4fF03373931769A31Fc52A4E78B5d70
FolioFeeRegistry 0x0262E3e15cCFD2221b35D05909222f1f5FCdcd80
FolioVersionRegistry 0xA665b273997F70b647B66fa7Ed021287544849dB
Folio (Implementation) [1.0.0] 0xD09d387b9AF1c0482aC1FF24b43E48757C6aA870
Folio (Implementation) [2.0.0] 0x089357A774151Ffdd24269204Cb789e298E31f09