Skip to content

Vault Binding And Credentials

Binding Inputs

  • validator pubkey hash (sha256(pubkey))
  • predicted or deployed vault address
  • immutable config hash from factory
  • address derivation version

Required Consistency Checks

Deposit path expects all of the following to match:

  • factory.isVault(vault) == true
  • factory.vaultByValidatorPubkeyHash(pubkeyHash) == vault
  • vault.validatorPubkeyHash() == pubkeyHash
  • vault.executionWithdrawalCredentials() == supplied withdrawal credentials
  • vault.vaultConfigHash() == baseline immutable config hash
  • vault.addressDerivationVersion() == baseline derivation version

Why This Matters

If any link breaks, funds can be misrouted or safety checks can be bypassed by malformed credential paths.

Risk Boundaries

  • wrong vault address in withdrawal credentials can trap or redirect value
  • wrong controller binding can disable safe claims and exit operations
  • wrong beacon linkage can attach vault proxy to unexpected implementation stream