Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Lido trustless indicator #10416

Merged
merged 1 commit into from
Jun 13, 2023
Merged

Update Lido trustless indicator #10416

merged 1 commit into from
Jun 13, 2023

Conversation

wackerow
Copy link
Member

@wackerow wackerow commented Jun 8, 2023

Description

IIRC, the Lido "Trustless" indicator was marked false due to 0x00 withdrawal credentials that had not been updated. This has reportedly been completed now (cc: @isidorosp), with request to update field value. PR flips the isTrustless boolean for Lido to true

Note, ongoing discussion in #6452 regarding potentially redefining that category, but this PR does not address anything related to changing the definition.

Related Issue

Reported on Discord

all withdrawal credentials reportedly updated to 0x01
@gatsby-cloud
Copy link

gatsby-cloud bot commented Jun 8, 2023

✅ ethereum-org-website-dev deploy preview ready

@isidorosp
Copy link

Hey @wackerow thank you for the PR reflecting the change! Just a small nit with regards to the context: rotating credentials prior to Shapella was not possible. Once Shapella went live the credentials were rotated ASAP and the results of it were evidenced and announced on twitter: https://twitter.com/LidoFinance/status/1646977448410480643

@wackerow
Copy link
Member Author

Yes 100%, pretty sure the only differentiator was some that came later we're able to default to 0x01 from the start. Glad to hear this got handled smoothly!

@corwintines corwintines merged commit b607257 into dev Jun 13, 2023
3 checks passed
@corwintines corwintines deleted the lido-status branch June 13, 2023 21:04
This was referenced Jun 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants