Node Operator Type Assessment Framework | CMv2

TL;DR

This proposal focuses on how Node Operators qualify for CMv2 Node Operator Types, rather than on the specific values for the parameters assessed.

  • The Phase 1 CMv2 parameters by Node Operator type are proposed separately; this document explains the qualification mechanics, requested data, assessment logic, and reassessment flow.
  • Professional Operator remains the onboarding / trial / downgraded stage, while Professional Trusted Operator remains the default trusted state for established operators or successful graduates from the trial stage.
  • Public Good and Extra Effort are assessed through operator applications, while Decentralization Operator is assessed through a score-based methodology using VaNOM data and has a limited number of seats.
  • Reassessments are proposed to happen twice a year. For the special types, the proposed assessment order is Public Good → Extra Effort → Decentralization.
  • Assessment outcomes are intended to be shared on the forum in aggregated form, while raw operator submissions and raw VaNOM data are not intended to be published.

Purpose

This framework is intended to increase transparency and consistency in how Node Operators are assessed and how Node Operator Types are assigned in Curated Module v2 (CMv2). It proposes a common qualification framework so that type assignments can be explained, replicated, and audited over time.

While the Phase 1 CMv2 parameters by Node Operator type have already been proposed separately, an equally important question remains: how do Node Operators qualify for those types in practice? This proposal addresses that question by defining the requested data, assessment logic, scoring methodology, and reassessment flow for assigning Node Operator Types within CMv2.

Types

  • Professional Operator – an entity that joined after the CMv2 release (newcomers) and has not yet established a strong record of performance and reliability within the Lido Protocol. It is assumed that new entrants will initially fall into this category after onboarding to CMv2. This type is meant to serve as a “trial” stage in their validation journey within the Curated Module of the protocol. It may also serve as a fallback type for operators that are downgraded from another Node Operator Type following a significant incident or reassessment outcome showing that they no longer meet that type’s requirements.
  • Professional Trusted Operator – a for-profit entity that was onboarded to CMv1/graduated Professional Operators and does not fall into any other operator type. This category represents the default type for professional operators who have consistently demonstrated strong performance and reliability, building their reputation as Lido Node Operators over time. It includes both existing CMv1 Operators migrating to CMv2, as well as new Operators who have successfully completed the Professional Operator trial stage.
  • Public Good Operator – an entity developing or substantially supporting in a financial manner an Ethereum Execution, Consensus Layer or validator client.
  • Extra Effort Operator – an entity that demonstrates strong alignment with the Lido Protocol through additional contributions: bringing stake via stVaults or Lido Core, has ability to participate in Lido DAO governance by holding its governance token (LDO).
  • Decentralization Operator – an entity maintaining its infrastructure in underrepresented geographic regions in terms of Ethereum decentralization, or running diverse and decentralized client and infrastructure setups.
  • Intra-Operator DVT Cluster – a distributed validator cluster composed of cluster members belonging to the same entity.

Professional Operator Type Assessment

The Professional Operator type is the entry tier of the Curated Module v2 and is designed as a trial stage for newly onboarded Node Operators. It applies to NO’s joining the Curated Module after the CMv2 release that have not yet established a performance and reliability track record within the Lido Protocol.

New Professional Operators are onboarded through onboarding rounds, which are proposed when the Curated Module Committee (CMC), together with contributors from the Node Operator Mechanisms (NOM) workstream, determine that protocol conditions and DAO strategy justify expanding the curated operator set.

Data Requested During Onboarding Rounds

Node Operators applying during an onboarding round will be required to submit structured information covering the 5 following areas:

  • General Entity Information: Basic information about the applying company, including legal entity name, jurisdiction, headquarters address, and primary contact details.
  • Experience & Business Case: Evidence of prior staking experience, validator fleet size, assets staked historically, duration of operations, performance track record, any slashing history, clients served, and the strategic rationale to the protocol for joining the Curated Module.
  • Infrastructure Setup: A detailed description of their validator architecture, including server type (bare metal/cloud), hosting providers and locations, redundancy and standby setup, overall failover design, EL and CL client choices, validator client and signer configuration, EL connection type (one to one or multiplexer), PBS setup, and relay configuration.
  • Key Generation & Key Management: Explanation of key generation procedures, custody model, storage setup, access controls, backup and recovery processes, and whether signing infrastructure is hosted on bare metal or cloud environments.
  • Operations & Monitoring: Description of monitoring and alerting systems, on-call rotation and incident response processes, security practices, audits or certifications (if any), performance tracking methodology, and general operational maturity.

Once all required data is gathered during an onboarding round, the CMC conducts a structured assessment of each applicant. The purpose of this assessment is to evaluate whether the Node Operator meets the risk, operational, and decentralization standards expected for entry into the Curated Module under the Professional Operator category.

The assessment is multi-dimensional and score-based. CMC members independently review the submitted materials and assign a score to a defined set of categories. The final list of the Node Operators to get onboarded is proposed to the DAO via Snapshot.

Category What is Assessed
Key Generation & Key Security Management Security of key creation process, ceremony controls, isolation, documented procedures, custody model, signer setup, access controls, backups, recovery procedures
Infrastructure Architecture Redundancy, failover design, client diversity, hosting model, avoidance of single points of failure
Decentralization Contribution Geographic, jurisdictional and provider diversity; marginal impact on stake concentration
Strategic / Business Case Alignment How onboarding the Node Operator supports the Lido ecosystem, e.g. increasing stake within the protocol, improving stETH trading liquidity, building products based on stETH, etc.
Operational Experience & Performance Validator fleet size, duration of operation, historical performance, slashing history
Monitoring & Incident Response Monitoring stack, alerting quality, on-call rotation, incident playbooks, responsiveness
Security Posture Audits, insurance (if any), bug bounty participation, general security maturity

Exceptional Onboarding Cases

While onboarding rounds represent the standard mechanism for admitting new Professional Operators, there may be exceptional situations in which the CMC determines that proposing the onboarding of a specific operator or a small number of operators is beneficial even when there is no immediate need to materially expand the Node Operator set.

In such cases, the CMC may submit a proposal to the DAO if the candidate demonstrates a particularly strong strategic or ecosystem-aligned business case for inclusion in the Curated Module. Examples may include situations where onboarding the operator enables meaningful collaboration with an important ecosystem participant, strengthens Lido’s presence within a relevant network segment, or otherwise advances the protocol’s strategic objectives. Any such proposal would still be accompanied by a full assessment of the operator’s technical, operational, and risk profile consistent with the Professional Operator evaluation framework.

In all cases, the DAO is the final arbiter of operator inclusion into the Curated Module, and any person or entity may put forth a proposal for consideration of inclusion of a Node Operator into the permissioned part of the protocol following the standard governance process, bypassing the standard CMC-driven process.

Downgrading Path

In addition to serving as the entry tier for newly onboarded operators, the Professional Operator type may also function as a fallback category for operators that were previously assigned another Node Operator Type but, following reassessment or a material operational event, no longer meet the requirements for that type. In particular, where a significant incident demonstrates a meaningful deterioration in the operator’s reliability, security posture, operational maturity, or overall standing, the CMC may determine that the operator should be downgraded to the Professional Operator type, either temporarily or until the relevant concerns are remediated and verified in a subsequent reassessment cycle.

Graduation Criteria

Operators that have been onboarded in CMv2 as Professional Operators and comply with the following criteria may become eligible to transition out of the trial stage and be assigned another Node Operator Type. Meeting these criteria should be understood as a general graduation baseline applicable across CMv2 type reassessments. Additional operator types (Decentralization Operator, Extra Effort Operator, and Public Good Operator) impose their own additional type-specific eligibility criteria.

  • Ideally 9 months of active participation in CMv2, with average performance above network average. Slightly lower performance can be acceptable for candidates to Decentralization Operator type (e.g. due to operation in regions that materially affect performance) and assessed on case by case basis.
  • No slashing events and no material inactivity penalties
  • No major operational incidents within the last 6 months
  • Responsive and constructive communication with the NOM team, including timely replies to operational, technical, and incident-related requests
  • Demonstrated security and operational maturity. This may be evidenced through formal proofs, such as a SOC 2 Type II audit, ValOS certification, or a comparable independent security or infrastructure audit, but may also be supported by other non-formal evidence demonstrating mature operational and security practices.

Operators meeting these conditions may be reviewed by the CMC and, upon confirmation, reclassified as Professional Trusted Operator or other types within CMv2.

Professional Trusted Operator Type Assessment

The Professional Trusted Operator type represents the default type for established, for-profit Node Operators within the Curated Module. It consists of two groups:

  • CMv1 Operators that migrate to CMv2 and remain in good standing.
  • Newly onboarded operators to CMv2 that successfully complete the Professional Operator trial stage and fulfill the defined graduation criteria.

CMv1 operators are included by default, as they have already demonstrated sustained performance and reliability within the Lido Protocol. Their historical track record serves as the basis for trusted status upon migration to CMv2.

Intra-Operator DVT Cluster

This type builds on the single operator DVT framework introduced in June 2025 and can be issued to a Node Operator on request in addition to other types. This type can be issued outside of the reassessment window. The Intra-Operator DVT Cluster type will allow for Node Operators to clearly delineate validators utilizing single-operator DVT within their stack, and provide flexibility for the DAO to modify parameters related to the Node Operator type if needed in the future. Node Operators running keys under this type must:

  • Run validators using Obol or SSV
  • Generate the keys via DKG ceremony
  • Enroll in monitoring via DVT provider specific tooling (e.g. Obol Grafana metrics, automated SSV Network metrics)
  • Maintain a Intra-Operator DVT cluster on an Ethereum testnet (e.g. Hoodi)
  • Coordinate with contributors in the Node Operator Mechanisms workstream to verify DKG utilization and monitor protocol infrastructure diversity

Public Good Type Assessment

The Public Good Operator type acknowledges operators that are meaningfully involved in the development or maintenance of core Ethereum infrastructure, including:

  • Execution Layer (EL) clients
  • Consensus Layer (CL) clients
  • Validator clients

Operators in this type (often referred to as Client-Team Operators) contribute engineering resources or a meaningful portion of their revenue to the development and maintenance of Ethereum client software used across the network. These efforts play a critical role in maintaining the health and decentralization of Ethereum by ensuring that multiple independent client implementations remain viable and actively maintained.

Beyond their development contributions, Public Good Operators frequently serve as technical resources for the broader Node Operator set, helping other operators adopt, operate, and troubleshoot different client implementations. This role supports the diversification of client usage across the validator ecosystem and helps mitigate systemic risks associated with client monoculture.

Assessment Considerations

When evaluating eligibility for the Public Good Operator type, CMC may consider several factors, including but not limited to:

  • Active involvement in the development or maintenance of an Ethereum client
  • Participation in client maintenance, bug fixing, and release support
  • Portion of revenue allocated to the development or maintenance of an Ethereum client
  • Engagement with the broader Ethereum community and developer ecosystem

Extra Effort Type Assessment

The Extra Effort type is designed to recognize Node Operators who contribute additional value to the Lido ecosystem beyond validator operations. While the Professional Operator assessment focuses on operational reliability and infrastructure quality, the Extra Effort type rewards operators who actively strengthen the protocol through capital participation and long-term alignment with the Lido DAO.

An operator may qualify for the Extra Effort type through one or both of the following forms of contribution:

  • Bringing stake to the protocol, either to Lido Core or to stVaults
  • Demonstrating long-term alignment with the Lido DAO through meaningful LDO token holdings (and ideally vote participation)

Node Operators seeking the Extra Effort designation must submit an application to the Curated Module Committee providing verifiable proof of their contributions. Submitted data will be reviewed and validated by the CMC as part of the reassessment process.

The framework also recognizes certain forms of ongoing protocol service as a partial equivalent of capital-based contribution. In particular, Node Operators that operate Lido Oracles or the DSM perform additional responsibilities beyond validator operations, including supporting critical protocol infrastructure and operational security. Because this work creates recurring operational burden and protocol-level responsibility, it may be recognized within the Extra Effort framework as a limited adjustment to tier thresholds.

Tier Structure

The Extra Effort type is applied proportionally to the validator keys/stake operated by a Node Operator. Depending on the magnitude of their contribution, operators may qualify for one of five tiers.

Tier Qualified Stake Share
Tier 1 20%
Tier 2 40%
Tier 3 60%
Tier 4 80%
Tier 5 100%

This means that only the corresponding portion of the operator’s validator stake will be treated as Extra Effort qualified.

The system is additive across contribution categories, capped at 100%. For example:

  • An operator qualifying for Tier 1 via LDO holdings (20%)
  • And Tier 2 via stVaults stake contribution (40%)

would receive a combined Tier 3 qualification, allowing 60% of their stake to be classified under the Extra Effort type.

As a limited exception, a Node Operator that operates Lido Oracles or the DSM may receive a contribution credit equal to one half of Tier 1. This credit may be applied as a reduction to the otherwise required threshold under the stake, stVaults, or LDO pathway. In practical terms, this means that such an operator would need to satisfy only half of the Tier 1 requirement to reach Tier 1, and the same fixed equivalent may also be applied toward higher tiers. For example, if the default Tier 1 stake threshold is 8,800 ETH, an eligible Oracle/DSM operator would need to contribute 4,400 ETH to reach Tier 1. If the default Tier 2 threshold is 17,500 ETH, the same operator would need to contribute 13,100 ETH instead. The same logic applies to LDO-based thresholds and to stake brought through stVaults.

Eligibility and Capacity

The Extra Effort type does not have a fixed number of available slots. Any Node Operator that satisfies the relevant tier thresholds and successfully passes the CMC review may receive the Extra Effort designation.

This structure ensures that the mechanism:

  • Encourages operators to bring additional value to the protocol
  • Maintains transparent and measurable qualification thresholds

The quantitative thresholds for each tier will be reassessed periodically, typically prior to each reassessment cycle, to ensure they remain appropriate relative to protocol growth and overall stake distribution.

Lido Core / stVaults Contributions

One pathway to qualifying for the Extra Effort type is through bringing additional ETH stake to the Lido ecosystem.

Operators may contribute stake in two ways:

  • Lido Core — whereby attributable stake is determined through the rewards share program.
  • stVaults — whereby attributable stake is determined through stVaults which operated by the NO.

Recognizing stake contributions incentivizes Node Operators to actively grow the protocol’s TVL and to promote Lido as a part of their product offerings.

The table below outlines the minimum stake contribution thresholds at default fees required to qualify for each tier.

These thresholds may change as the protocol grows or as staking market conditions change. Actual thresholds will be defined by the CMC before each reassessment round.

If a Node Operator has a custom set of fees for stVaults, the thresholds will be recalculated ad-hoc for this Operator.

LDO Contributions

The second pathway to Extra Effort qualification is through holding LDO tokens, the governance token of the Lido DAO.

LDO holders can participate in protocol governance by voting on proposals affecting:

  • protocol upgrades and configuration / parameters
  • treasury decisions
  • node operator set composition
  • broader strategic direction

Recognizing LDO holdings within the Extra Effort framework rewards operators who demonstrate long-term alignment with the DAO and its governance process.

To qualify under this pathway, the relevant LDO balance must be continuously held at the Node Operator’s designated address for at least 2 months prior to the reassessment date. This requirement is intended to prevent short-term balance parking around reassessment rounds.

The table below outlines the LDO holding thresholds required to qualify for each tier.

These thresholds may change as the LDO/USD; LDO/ETH ratio or staking market conditions change. Actual thresholds will be defined by the CMC before each reassessment round.

Decentralization Operator Type Assessment

In Phase 1 of CMv2, Node Operator fees are fixed and the DAO fee target constrains how many Decentralization Operator seats can exist at any given time. For each reassessment cycle, the CMC defines the number of available Decentralization Operator seats in advance, scores all eligible operators under the methodology below, and assigns the type to the highest-ranked operators.

It is proposed that operators are ranked using a scoring system: Operators can see where they stand and what levers improve their outcome. In order to be eligible for this node operator type, Node Operators must disclose information regarding their infrastructure setup at the full detail requested for Lido Validator and Node Operator Metrics (VaNOM) reporting, and accept that this data may be utilized to report infrastructure setup publicly (at a disaggregated level).

Pillars

It is proposed that the Decentralization Score is built from three pillars:

  1. Client diversity: [-10; +30] points
  2. Geography: [-10; +20] points
  3. Infrastructure: [-20; +10] points

Score = Client [-10; +30] + Geo [-10; +20] + Infra [-20; +10]

Scores under this framework may be negative. A negative score does not affect an Operator’s participation in Lido Operator set or its eligibility for other operator types. It only affects relative ranking for the limited Decentralization Operator seats in that reassessment cycle.

Parameter weights

Client diversity

Assessment on CL and EL client diversity is based on a system of predefined scoring curves. Under this approach, at each reassessment round, every client is classified according to its current network position as a non-majority (minority) client, a majority client, or a super-majority client, and the corresponding predefined curve is used to convert the operator’s share of that client into points.

This approach is intended to capture two related but distinct objectives. First, it rewards Node Operators that contribute to network-wide client decentralization by materially using non-majority clients. Second, it rewards operators that improve intra-operator resilience by distributing their validator fleet across multiple clients rather than depending on a single one. As a result, the methodology does not treat a setup with a single minority client at 100% as equivalent to a balanced multi-client setup: concentrated minority-client usage can still receive some positive credit, but materially less than a diversified configuration. Additionally, setups where client pairs are used in a consensus or circuit-breaker like setup (e.g. utilizing Vouch, Vero, intra-operator DVT with multiple clients, etc.) may eventually also be treated as a separate class of infrastructure diversity or lead to changes in the proposed framework in the future.

CL and EL client diversity are assessed separately. Each layer can contribute up to 15 points, for a total Client diversity score of up to 30 points.

How the scoring works

For every EL and CL client, the operator’s usage share is mapped onto one of three predefined curves:

  • non-majority (minority) client curve
  • majority client curve
  • super-majority client curve

The graph below shows the three scoring curves used in the framework.

X-axis: Percentage of stake run by the operator using the client
Y-axis: Score points

More specifically:

  • the non-majority curve peaks at roughly 33% usage and then declines gradually, while remaining above zero even at very high shares;
  • the majority curve peaks at roughly 20% usage, then declines, crosses below zero once usage becomes too high, and converges to a negative floor;
  • the super-majority curve is strongly disincentivizing: after minimal usage, it becomes sharply negative and quickly reaches the maximum penalty.

What this means for non-majority client usage

For non-majority clients, the curve reaches its highest value when a client represents roughly one third of the operator’s fleet. This reflects the idea that the strongest operator-level setup is a balanced distribution across several non-majority clients. In practical terms, the highest score within a given layer can be achieved when a Node Operator runs an approximately even split across at least three non-majority clients, each representing around 33% of that layer. It is recognized that even more optimal combinations are possible (e.g. full circuit-breaker setup via Vouch), and it is possible that the framework will be further calibrated in the future to reflect this.

At the same time, the non-majority curve remains positive even at very high shares. This is intentional. Running 100% of a layer on a single non-majority client still contributes to network-wide client decentralization, however, because such a setup does leave room for additional meaningful intra-operator client resilience or failover diversity, it would score lower than a balanced multi-client setup. In other words, 100% on one non-majority client is better than 100% on one majority client, but substantially worse than a 33% / 33% / 33% split across three non-majority clients (or better).

What this means for majority client usage

For majority clients, the curve peaks at a lower share and at a lower score than for non-majority clients. This means majority clients are not forbidden, and they are not treated as automatically harmful when used in moderation. A majority client can still be part of a healthy setup when it represents a limited portion of the fleet.

However, once a majority client grows beyond its preferred range, the score falls quickly, crosses below zero, and eventually reaches a negative floor. The effect is that the framework allows majority clients to play a limited supporting role, but clearly discourages dependence on them as the dominant client inside an operator’s fleet.

What this means for super-majority clients

For super-majority clients, the curve is designed to be strongly disincentivizing. Small or incidental usage may remain close to zero, but once a super-majority client represents a meaningful share of the operator’s fleet, the score turns sharply negative and quickly reaches its minimum. This reflects the view that materially adding to the dominance of a super-majority client increases systemic client concentration risk and should therefore be treated as harmful within the Decentralization Operator assessment.

Reassessment of client categories

Client classifications should be re-evaluated before each reassessment cycle based on the then-current network state. A client that is treated as non-majority in one cycle may be treated as majority in a later cycle, and vice versa. If a client reaches super-majority conditions, it should be scored under the super-majority curve for that reassessment period. This ensures that the methodology remains responsive to actual network conditions rather than static assumptions.

Geographical diversity

Underrepresented regions

This scoring category is meant to incentivize operating in regions that are currently underrepresented in Ethereum’s / Lido Protocol validator geography distribution. Geo diversity increases resilience against regional outages (power, connectivity), natural disasters, and jurisdiction-specific risks (regulatory action, censorship pressure, or policy-driven infrastructure restrictions). From a protocol perspective, it reduces the chance that a single region’s disruption causes a large fraction of validators to go offline simultaneously.

Overrepresented regions

This scoring category is meant to disincentivize concentration in overrepresented regions because it amplifies correlated risks: if too many validators share similar legal jurisdictions, cloud markets, peering paths, or power grids, the network becomes more fragile to region-specific shocks.

The list of countries / jurisdictions and their classification as underrepresented, neutral, or overrepresented should be published for each assessment cycle together with the relevant methodology updates.

Dispersion / resilience score

In addition to rewarding placement in underrepresented regions and penalizing concentration in overrepresented ones, the Geography pillar should also reward operators that distribute meaningful parts of their validator fleet across multiple materially distinct countries or jurisdictions. The purpose of this subscore is to capture operator-level resilience: an operator that is spread across several separate legal, regulatory, power, connectivity, and hosting environments is less exposed to a single regional outage or jurisdiction-specific shock than an operator concentrated in one place. For this purpose, a country or jurisdiction counts as materially distinct if it represents a separate sovereign country or a geographically distinct territory with meaningfully independent power, connectivity, and hosting infrastructure, and it hosts at least 15% of the operator’s average active validator stake during the assessment period; multiple cities, data centers, or availability zones within the same country do not count as additional dispersion, and token deployments below 15% are ignored for scoring.

The Dispersion / resilience score is assigned as follows:

  • 0 points if the operator has only 1 qualifying country/jurisdiction;
  • +2 points if the operator has 2 qualifying countries/jurisdictions;
  • +5 points if the operator has 3 or more qualifying countries/jurisdictions.

The score is capped at +5, so the framework rewards meaningful cross-jurisdiction distribution without encouraging artificial fragmentation.

Infrastructure

Validators run On-Premises

This category is meant to incentivize meaningful on-prem presence because it reduces reliance on shared cloud failure domains. On-prem validators diversify away from correlated cloud outages, cloud networking incidents, provider-level policy changes, and large-scale credential compromise patterns that can affect many tenants at once.

Validators run on Cloud

This scoring category is meant to disincentivize extreme dependence on cloud hosting. Cloud infrastructure is operationally efficient, but from a decentralization lens it introduces correlated dependencies: shared provider control planes, shared physical regions, shared upstream outages, and sometimes shared compliance constraints.

Validators run on majority Cloud

This scoring category is meant to disincentivize reliance on the single largest cloud provider in the Operator’s fleet. Even if an Operator is “on cloud,” distributing across providers reduces correlated risk from a single vendor’s control-plane outage, regional routing events, or policy/enforcement actions. It is proposed that the “majority cloud” provider is defined per quarter from VaNOM/provider-mapping data, rather than hard-coded, because market share can shift.

(End of Part 1 – continuation in next section)

6 Likes

(Beginning of Part 2 – continued from previous section)

Assessment cadence and flow

It is proposed that reassessment happens twice a year, aligned with the cadence of reliable new VaNOM data availability. This cadence reduces noisy month-to-month changes and ensures Operators are assessed on a meaningful operating window rather than one-off events. Assessments in the current version of the framework rely on operator-submitted applications and VaNOM data. Unless otherwise stated, the CMC assumes submitted data is truthful and materially accurate, and any indication that the data provided is not truthful or accurate would be investigated with possible penalties (up to and including removal from the Curated Module). Further, Node Operators wishing to apply for the PG or DO node operator types would be asked to assent possible audits with regards to verification of submitted data.

This cadence is intended primarily for the Public Good, Extra Effort, and Decentralization Operator types. Professional Operator onboarding and Professional Trusted Operator graduation continue to follow their dedicated processes described above.

For the special types, the proposed order of assessment within each reassessment wave is:

  1. Public Good Operator | Application-based assessment

    Before each assessment round, Node Operators that seek the Public Good Operator type should apply or re-apply using a form distributed by NOM contributors, providing information on their Ethereum Execution Layer, Consensus Layer, or Validator Client contributions. Operators approved for the Public Good Operator type are excluded from being considered for the Decentralization Operator type in the same assessment round.

  2. Extra Effort Operator | Application-based assessment

    Before each assessment round, the CMC should publish the applicable Extra Effort tier values for that round (e.g., Lido Core / stVaults contribution thresholds and LDO-related thresholds). Node Operators that seek the Extra Effort type should apply or re-apply using a form distributed by NOM contributors, providing evidence of their stake inflow contribution via stVaults or Lido Core and their LDO holdings.

    Operators that are approved for the Extra Effort Operator type on 100% of their keys are excluded from being considered for the Decentralization Operator type in the same round. If an Operator receives the Extra Effort type only on a portion of its keys (e.g., Tiers 1–4), the remaining keys may still be considered for the Decentralization Operator type.

  3. Decentralization Operator | VaNOM-based assessment, no application required

    Before each assessment round, the CMC should publish the parameters that apply to the Decentralization Operator assessment for that round, including the number of available seats, client category mappings (non-majority / majority / super-majority), geography classifications, and any other relevant methodology updates. Every assessment round, eligible Node Operators are reassessed for the Decentralization Operator type based on the relevant VaNOM data. The highest-ranked eligible Operators receive the type, subject to the number of available seats and the exclusions resulting from earlier assessment steps.

    If two Operators are materially tied for the final available seat, the CMC may split that final seat and assign the Decentralization Operator type to both, with each receiving the type for 50% of their keys, similarly to the proportional mechanics used for Extra Effort tiers.

    The number of available Decentralization Operator seats should remain limited and adjustable from round to round. This is intended to preserve the category as a targeted incentive mechanism rather than a new baseline for the majority of the operator set. In determining the appropriate number of seats, the CMC should take into account both the state of Ethereum and Lido decentralization and the economic tradeoffs of allocating additional rewards to this category. Where decentralization conditions are improving or appear broadly healthy, the CMC may choose to apply this incentive more narrowly. Where client, infrastructure, or geographic concentration risks are increasing, the CMC may choose to allocate a greater share of seats to support stronger decentralization outcomes. At the same time, the DAO is not expected to treat Decentralization Operator status as the default outcome for most operators; rather, it is intended as a bounded mechanism to reward and encourage behaviors that provide meaningful decentralization benefits but may not yet be fully recognized or compensated by the market on their own.

Data submitted by Operators through application forms or VaNOM reports is not intended to be publicly shared in raw format. Instead, aggregated assessment outcomes (for example, Public Good approvals, Extra Effort tiers, and Decentralization scores / rankings) should be shared on the forum to provide transparency on the outcome of each assessment wave.

Framework Maintenance

In order to keep the framework flexible and to streamline the governance process around it, it is proposed that the CMC will be responsible for:

  • Adjusting the framework: its score system, requirements and general methodology
  • Defining thresholds and parameters for each assessment round
  • Define when the reassessment should take place
  • Assigning types according to the actual version of the framework
  • Communicate updates and adjustments to the framework publicly on the research forum

Tokenholders may at any time vote to rescind or reassign these responsibilities to another group, entity, individual, and may vote to modify, extend, or remove them entirely.

6 Likes