SKIP TO CONTENT
Security

Governance Attack

Exploiting a protocol's voting system to pass malicious proposals that benefit attackers.

What is a Governance Attack?

A governance attack exploits a protocol's on-chain voting system to pass malicious proposals that benefit the attacker at the expense of other stakeholders. These attacks can involve flash-loaned voting power, accumulated governance tokens, or compromised delegate votes to approve proposals that drain treasuries, modify protocol parameters, or transfer control.

How it Works

Governance attacks manipulate the democratic processes protocols use for decision-making. Attackers need sufficient voting power to pass proposals, obtained through various means.

Common governance attack vectors include:

  1. Flash Loan Voting: Borrow tokens to vote, return after vote executes
  2. Governance Token Accumulation: Buy enough tokens to control votes
  3. Delegate Manipulation: Compromise or bribe large delegates
  4. Proposal Obfuscation: Hide malicious effects in complex proposals
  5. Quorum Attacks: Pass proposals when participation is low
  6. Timelock Bypass: Exploit emergency mechanisms to skip delays

Defenses include vote locking, snapshot-based voting, and timelock delays.

Practical Example

Beanstalk suffered a $182 million governance attack in 2022. The attacker took a flash loan, used borrowed governance tokens to pass a malicious proposal, and drained the treasury before returning the loan. The entire attack occurred within a single transaction. Build Finance DAO lost control when an attacker accumulated governance tokens and passed proposals granting themselves minting rights.

Why it Matters

Governance attacks exploit the very mechanisms meant to decentralize control. Protocols must balance accessibility with security, implementing safeguards like vote locking periods, proposal thresholds, and timelock delays. Users should understand governance mechanisms and participation rates before trusting protocols with significant holdings.

Fensory analyzes protocol governance structures and historical voting patterns, helping users understand the security and decentralization of DeFi governance systems.

Examples

  • Beanstalk lost $182 million to a flash loan governance attack
  • Build Finance DAO was taken over through governance token accumulation

From definition to application. Explore real opportunities.

Track live yields, compare protocols, and build your DeFi portfolio with Fensory.

GET EARLY ACCESSArrow right