Strategy Vaults are controlled through a combination of role-based permissions, Squads smart accounts, and optional proposal-based governance flows. This page explains who controls a vault, how that control is exercised onchain, and how to think about the distinction between the manager signer, the vault smart account, and the governance flow for vault changes.
Strategy Vault Control Model
At a high level, a Strategy Vault has three different control surfaces:- Vault roles — role lists stored directly in the
ExponentStrategyVaultaccount - Squads accounts — the vault’s settings account and smart account used for execution
- Governance flow — proposal, voting, timelock, and execution for certain vault changes
The Main Accounts
TheExponentStrategyVault account stores the core vault configuration and authority references, including:
rolessquads_settingssquads_vaulttoken_entriesstrategy_positions- financial state and vault config
squads_settings
The Squads settings account stores smart-account configuration, signers, and policies. It governs what the Strategy Vault smart account can do.
squads_vault
The Squads smart account is the execution account for the vault. It is the account that:
- holds funds on behalf of the vault
- signs CPIs as the vault
- executes policy-constrained interactions with external protocols
The manager key is not the vault’s fund-holding account. The vault’s assets and CPI authority live under the Squads smart account.
Vault Roles
The vault stores role membership inVaultRoles:
- Manager
- Curator
- Allocator
- Sentinel
The manager is the main administrative and operational role of the vault. Managers are responsible for vault-level configuration, role management, tracked strategy position updates, and governance proposal creation.The manager key is an authorized control signer, but it is not the vault’s asset-holding account. Vault assets and CPI authority remain under the vault’s Squads smart account.Basic role management flow
- Fetch the current vault state
- Read
vault.roles.manager - Add, remove, or replace the relevant manager public key
- Submit the corresponding manager-authorized update
- Refetch the vault and verify the new manager set onchain
- vault administration
- rotating manager authority
- updating other role sets
- creating governed changes