โš ๏ธ Governance Attacks: Hostile Takeovers

Learn how attackers exploit voting systems for profit

Upgrade blockchain protocol through voting

Governance Attacks

Attack Vectors

On-chain governance systems face unique security challenges. Attackers can exploit voting mechanisms, economic incentives, and protocol rules to pass malicious proposals or extract value.

๐ŸŽฎ Governance Attack Simulator

Choose an attack and defend your protocol:

Attack Configuration

Attacker's Tokens100,000
Required for Flash Loan Attack: 400,000 tokens
Select Protocol Defenses:

Real-World Attacks

โšก

Beanstalk Governance Attack (2022)

Attacker used $1B flash loan to acquire 79% voting power, passed malicious proposal to drain $182M in 13 seconds. No timelock delay allowed instant execution.

Loss: $182M โ€ข Defense Failed: No timelock
๐Ÿ’ฐ

Tornado Cash Governance Takeover (2023)

Attacker accumulated 1.2M TORN tokens (25% supply) over months, proposed giving themselves 10,000 TORN, self-approved with majority voting power.

Cost: ~$3M โ€ข Defense Failed: Token concentration
๐ŸŽ

Curve Wars - Bribery Markets

Protocols bribe veCRV holders via Votium/Hidden Hand to vote for their gauge weight. Not malicious, but shows how voting can be bought legally.

Weekly bribes: $1M-5M โ€ข Accepted practice in DeFi

Defense Mechanisms

โฑ๏ธ Timelocks

Mandatory 1-7 day delay between approval and execution. Gives stakeholders exit opportunity if they disagree with changes. Most critical defense mechanism.

๐Ÿ“ธ Snapshot Block

Record voting power at proposal creation, not during vote. Prevents flash loan attacks and last-minute token accumulation to manipulate votes.

๐ŸŽฏ High Quorum

Require 30-60% participation threshold. Makes attacks expensiveโ€”attacker needs massive capital to reach quorum alone. Tradeoff: legitimate proposals may fail.

๐Ÿ›ก๏ธ Veto Power

Security multisig or guardian council can cancel malicious proposals. Centralization tradeoff for security. Used by Optimism, Compound as last resort.

โš ๏ธ The Security Trilemma

Governance systems cannot simultaneously maximize:

  • โ€ขSpeed: Fast decisions vs defense time windows
  • โ€ขDecentralization: Open participation vs concentrated attack resistance
  • โ€ขSecurity: Attack prevention vs governance flexibility