Communities thrive withPowers
Increase security, transparency and efficiency by separating and distributing powers in on-chain organisations.
The next generation of on-chain governance
Powers allows a single decision to travel along multiple stakeholders through a modular, asynchronous and trustless governance path before it is executed.

The Added Value of Powers
Powers has several advantages in comparison to existing governance protocols.
Increase efficiency
- Only vote on proposals that concern your role.
- Streamline decision making processes.
Avoid single points of failure
- Create interlocking roles to avoid single points of failure.
- Render hostile takeovers increasingly difficult.
Allow granular upgrades
- Granular controls over upgrades.
- Upgrades can be packaged as a single action and executed in one transaction.
Increase transparency
- All votes and decisions are logged on-chain.
- Decisions can be traced back along governance paths.
Create trustless on- and off-chain governance
- Build on-chain systems that seamlessly integrate off- and on-chain actions.
Avoid centralisation
- Avoid centralisation of power.
- Separate powers between stakeholders.
- Create checks and balances.
Integrate any existing protocols
- Integrate any existing protocols into your on-chain governance system.
- Hats Protocol, Governor.sol, etc.
Manage sub- or super-DAOs
- Create sub- or super-DAOs that can be managed by a main DAO.
- Use Powers as modular add-ons for existing DAOs.
Modular Voting
- Integrate any kind of voting mechanism.
- Token, quadratic, conviction, list based voting, etc.
Deploy Your Own Powers
Choose a template to try out the Powers protocol
Powers 101
A simple DAO with a basic governance based on a separation of powers between delegates, an executive council and an admin. It is a good starting point for understanding the Powers protocol.
Important: These deployments are for testing purposes only. The Powers protocol has not been audited and should not be used for production environments. Many of the examples lack basic security mechanisms and are for demo purposes only.