This proposal outlines implementing the Triggerable Withdrawal framework within the Lido protocol to enable permissionless, secure, and verifiable validator exits via the Execution Layer - enhancing the protocol’s fault tolerance, reducing trust assumptions, and paving the way for truly permissionless staking in Lido.
Abstract
The Triggerable Withdrawals (TW) mechanism is a critical extension of Lido’s architecture, enabling the initiation of validator exits without requiring the involvement of a Node Operator. TW is based on EIP-7002, which addresses a key issue in delegated staking. Previously, stakers had to rely on the goodwill of Node Operators - either to pre-sign an exit message or to agree to process it in the future. This limitation is now removed: any party with access to a validator’s withdrawal credentials can initiate its exit directly via the Execution Layer.
Motivation
For the Lido protocol, TW support means a substantial reduction in trust assumptions toward Node Operators and Oracles. It unlocks the following capabilities:
Permissionless Staking Modules, such as CSM, where ETH cannot be “held hostage” even if the operator misbehaves or significantly underperforms;
A mechanism for emergency validator exits, in case of key loss or a potential compromise event;
Direct DAO interaction, enabling the Lido DAO to request validator exits independently of Oracles.
Enables permissionless exits for validators that have been requested to exit, preventing NOs from delaying withdrawal requests fulfillment.
We kindly ask everyone to share their opinions and suggestions for improvement in this thread. If no objections are raised, the next step will be the Snapshot vote (presumably, on July 14).
I find it useful and well thought out. The only suggestion from my side is to have a detailed breakdown of the use cases. While they are listed with high-level descriptions, more detailed explanations might be useful for Lido Node Operators. CSM Node Operators can refer to the corresponding parts of the CSM v2 spec: 📝 Community Staking Module v2. Spec - HackMD. Still, having it all collected in one place seems useful to me.
Also, what to highlight that we’re introducing new Easy Track Factories for the sDVT committee and Node Operators in the Curated Module. These ET factories enable authorized entities to request validator exits via the Validator Exit Bus for specific validators. After initiating such exits, anyone can exit those validators using the TW framework on the EL.
It provides a crucial recovery path in catastrophic scenarios - such as when a Node Operator loses access to a validator key.
To make triggerable withdrawals safe and reliable, we suggest:
maxExitRequestsLimit: 11 200 validators (applies to both TW gateway and VEB modules)
exitsPerFrame: 1 validator
frameDuration: 48 seconds (resulting in (~1 800 validators/day))
This setup keeps TW permissionless and efficient, providing a sufficient capacity for emergency validator exits, while still limiting risks for any malicious attacks utilizing EIP-7002 if there is a protocol exploit
For full analysis (threat models, APR effects, benchmarks, etc.), check the detailed research here: TW module limits