local-first workflows for Ethereum validators

Validator Tools for
Ethereum validator operators.

Validator Tools is a local-first desktop GUI for Ethereum validators and 32+ ETH stakers on Linux, macOS, and Windows. It combines EIP-7002 exits, EIP-7251 consolidations, withdrawal routing, MEV-Boost and relay policy, credential changes, and monitoring into clear, repeatable workflows instead of one-off scripts, dashboards, and spreadsheets.

EIP-7002 / 7251 ready
Local-first, offline-capable
Safe / HSM-friendly signing
Queue-aware runs with history

When validator operations stop being manual, everything else gets simpler.

Planning, approvals, reviews and reporting stop living in separate tools. You work through a single flow — and every action leaves a trace.

Lighthouse Teku Lodestar Nethermind Prysm Nimbus

One run. Every step accounted for.

Validator Tools is organized around runs. Each run captures inputs, checks, previews, approvals and outputs — so nothing happens implicitly, and nothing gets lost.

Run builder
Start from a template, pick validator sets, and lock parameters.
Preview & diffs
See what changes before signing — clean summaries, less guesswork.
Exports
Produce payloads/configs/reports ready for your approval pipeline.

Note: The screenshots are illustrative — the run structure stays the same across clients and setups.

Start with Validator Tools

Downloads

Local install. No accounts.

Verify installers using checksums and signatures on the release page on GitHub .

Make validator ops repeatable.

A local-first desktop GUI that turns validator actions into rehearsed, reviewable runs — with queue-aware planning, signer-separated approvals, and a clean history.

Runs
not one-offs
Operations as a single, repeatable flow
Exits, consolidations, rotations and payouts become guided runs: inputs → checks → rehearsal → execution.
  • Dry-run, record and replay the same sequence with diffs.
  • Full run history for audits, handoffs and post-mortems.
Queues
kept predictable
Queue-aware scheduling that scales
Plan EIP-7002 / EIP-7251 actions around queue pressure and fee ceilings so big batches stay boring — in a good way.
  • Fee caps, pause/resume, retries and bounded concurrency.
  • ETA windows from protocol constants + live queue depth.
Signing
stays separate
Approvals that fit Safe / HSM workflows
The app prepares unsigned payloads locally — approvals stay in the signer you already trust.
  • Prepare → sign → execute stages aligned with governance.
  • No key persistence by default; optional scoped session keys.
Clarity
for teams
Economics, routing and reporting — in one place
MaxEB planning, payout routing rules, scanning, exports and stakeholder views — packaged into operator workflows.
  • MaxEB (7251) planning with tradeoffs and “what-if” thinking.
  • JSON/CSV exports, hooks and widgets for dashboards/reporting.

Operator questions, answered clearly.

Low-level operator notes on offline flows, keys, RPC access, exits and consolidations.

WORKFLOW

A run is the unit of intent: inputs → checks → outputs.

A run records what you’re trying to do and the evidence for it: selected validators, parameters, preflight checks, and the exact artifacts produced for approvals/signing/execution. It’s designed to replace “one-off commands + memory” with a repeatable, reviewable record.

  • Inputs: network, validator set, limits, routing/policy choices.
  • Checks: chain state, conflicts, eligibility, queue visibility, sanity rules.
  • Outputs: unsigned payloads + a human-readable summary for reviewers.
OFFLINE

Local-first means “works without accounts or a backend”.

Core workflows should run fully offline: build runs, validate inputs, generate exports, and keep history locally. Network access happens only when you explicitly query endpoints for live state.

  • No hidden dependencies: the app shouldn’t require login to function.
  • Telemetry: if ever present, it must be opt-in with a hard off switch.
  • Airgap path: export run bundles to move prep → offline signing safely.
STORAGE

Runs live locally — treat them like ops configuration.

The safest default is local storage for templates, run history, and exports. That’s good for privacy — and it also makes backups straightforward: copy the data directory or export portable run bundles.

  • Backups: snapshot the data directory (or export specific runs).
  • Handoffs: move runs between machines without losing context.
  • Audit: keep summaries + artifacts together for later review.
FOOTPRINT

Mostly I/O and parsing; heavy work is explicit.

Idle usage should be light. Spikes happen only during explicit operations: scanning large validator sets, building batches, or fetching state from endpoints. Long tasks should show progress and support safe cancellation.

  • CPU/RAM: dominated by scans and summaries, not background churn.
  • Disk: run history + exports + bounded caches (configurable).
  • Predictable: no surprise background jobs; you trigger the work.
TOPOLOGY

Yes — ops workstation talks to endpoints; nodes stay where they are.

A clean deployment is “ops box → beacon/EL endpoints”. Validators can run on servers or cloud, while the UI runs on a workstation. Signing can remain offline or in HSM/Safe, depending on your process.

  • Separation: prep/review on ops machine, signing on trusted signer.
  • Least privilege: prefer read-only endpoints where possible.
  • Portability: run bundles move across machines without rewriting playbooks.
ACCESS

It should not need SSH or direct control of your validator processes.

The intended model is endpoint-based: connect to beacon/EL APIs you provide. No shell access, no client restarts, and no “silent writes” to infra. Destructive actions should be gated behind export → sign → execute.

  • Default posture: read state, prepare artifacts, don’t mutate infra.
  • Explicit writes: only where your workflow demands it (and you approve it).
  • Clear scope: show exactly which endpoints are used for each run.
RPC

Authenticated providers are supported; credentials stay local.

If you use hosted beacon/EL providers, the app should support tokens/basic auth/custom headers and handle throttling predictably. The key is keeping credentials local and making access explicit.

  • Throttling: bounded retries + backoff, with clear errors.
  • Rotation: quick token updates without breaking other envs.
  • Safety: never embed secrets into exported artifacts by default.
ENV

Keep environments isolated: endpoints, policies, and history per cluster.

Operators usually have multiple contexts (mainnet/testnet, regions, clusters, customers). The safe pattern is separate profiles: each with its own endpoints, limits, and run history — to avoid cross-environment mistakes.

  • Profiles: mainnet/testnet separation with obvious labels.
  • Guardrails: show network + profile at the top of every run summary.
  • Exports: include env identifiers in filenames/manifests.
KEYS

No — the safe default is “prepare locally, sign elsewhere”.

Validator Tools should not require validator private keys, seed phrases, or keystore files for normal operation. It prepares unsigned artifacts and clear summaries so your existing signer flow stays in control.

  • Signer separation: hardware wallet, offline box, HSM, Safe — your choice.
  • Sensitive steps: if any exist, they must be explicit and opt-in.
  • No surprises: avoid hidden “helpful automation” around keys.
SIGNING

Yes — keep signing fully separate, with artifacts built for review.

A good ops flow is staged: prepare → review → sign → execute. Validator Tools should export artifacts that are easy to verify and safe to pass through your approval chain without copy/paste risk.

  • Offline signing: export to removable media and sign on an airgapped machine.
  • Team approvals: reviewers validate summaries/diffs before signatures.
  • Safe/HSM: keep governance and custody tooling unchanged.
SAFETY

It reduces human error: explicit intent + conflict checks + previews.

Most “operator incidents” are selection and process failures: wrong validators, wrong chain, duplicated actions, or assumptions not shared with reviewers. Runs help by forcing clarity and making reviews consistent.

  • Selection visibility: show exactly which validators are affected (and why).
  • Preflight checks: detect conflicts/incompatibilities before exporting anything.
  • Previews: reviewers approve intent, not reconstructed shell history.
SECRETS

Store only what’s necessary — locally — and keep it lockable.

If you use tokens for RPC providers, they should be stored locally and never included in exports by default. A practical UI also supports “operator hygiene”: lock the app, redact sensitive fields, and keep logs clean.

  • Local only: secrets never leave the machine unless you export them intentionally.
  • Redaction: avoid leaking tokens into screenshots/logs where possible.
  • Lock: optional app lock / inactivity lock for shared ops environments.
EIP-7002

Yes — exits are best handled as guided batches with clean exports.

Exits should be boring: deterministic parameters, explicit ordering, and a readable preview before signing. A GUI removes ad-hoc JSON-RPC juggling and makes it easier for teams to review the same thing every time.

  • Batches: group validators, apply limits, generate one coherent run.
  • Queue-awareness: show estimated timing windows based on current conditions.
  • Artifacts: exports designed for approvals/signers, not copy/paste.
WITHDRAW

Scan, validate destinations, and produce payout-ready reports.

Operators typically need: (1) confirm withdrawal credentials/destinations, (2) plan changes safely where applicable, and (3) output reports for finance/accounting and monitoring.

  • Scanning: summarize current credentials and expected destinations.
  • Routing: export lists/manifests for payout tooling and reconciliations.
  • Consistency: keep outputs stable so dashboards don’t break.
EIP-7251

Consolidations need planning: explicit mapping + previews + constraints.

Consolidations (MaxEB/EIP-7251) are high-stakes because they change validator structure. The tool should make source→target intent obvious, apply constraints, and produce artifacts that reviewers can validate quickly.

  • Planning: clear mapping, expected outcomes, and “what changes” summaries.
  • Controls: limits/order/maintenance windows to keep execution predictable.
  • Exports: human-readable manifests plus machine-readable payloads.
VERIFY

Verify binaries and artifacts before they ever reach a signer.

Treat the app like any ops binary: verify installers (hashes/signatures) and verify exports (manifest + hash) before signing/execution. The goal is a boring, repeatable checklist.

  • Downloads: checksums/signatures from a stable release page.
  • Exports: include network, validator set, timestamps, parameters — then hash it.
  • Process: generate → preview → verify → sign → execute.