Your commitment to providing clarifications in such a productive and constructive manner is truly commendable. We hope all contributors to Hub governance demonstrate this level of engagement when addressing feedback and defending their proposals. As stated before, we are not entirely against the proposal but are seeking more context and a clear purpose before reaching on-chain consensus. It’s encouraging to see you adopting this positive approach, as it benefits everyone involved: we gain a deeper understanding of your project and vision, the community gains greater clarity, and you benefit from refining your proposal, enhancing its chances of successful on-chain approval.
Returning to the topic, we appreciate the additional precision you provided regarding your vision and the utility this functionality could bring to the Hub in the context of its core principles: security and governance. In particular, we valued the following points from your latest response:
This directly addresses our primary concern, illustrating a practical use case where the Hub’s security could play a pivotal role in your design. Such a clear example helps everyone understand how this proposal could provide tangible benefits.
Again, this highlights a strong use case leveraging the Hub’s security. We encourage your team to elaborate on the selective criteria (if any) that will govern which projects can utilize this platform. This is critical to addressing concerns about opening the Hub to indiscriminate NFT minting, which could introduce risks. Specifically, bloating the chain with complex WASM transactions may inadvertently degrade the performance of the Hub’s core functionalities, such as interchain security, but also the regular slashing, governance, staking, bank and accounts module operations.
To clarify, we have never questioned your team’s reputation or the demand for your project. Our primary focus remains on understanding the rationale for deploying on the Hub versus alternative strategies. While you have provided strong arguments justifying the use of the Hub’s security enclave, we would like to see further details regarding the risk mitigation strategies your project plans to implement. This ensures the system has safeguards to prevent potential attack vectors that could disrupt the Hub’s core activities.
We look forward to your response as we continue this constructive discussion .