What is a Governance Attack?
A governance attack exploits a protocol's on-chain voting system to pass malicious proposals that benefit the attacker at the expense of other stakeholders. These attacks can involve flash-loaned voting power, accumulated governance tokens, or compromised delegate votes to approve proposals that drain treasuries, modify protocol parameters, or transfer control.
How it Works
Governance attacks manipulate the democratic processes protocols use for decision-making. Attackers need sufficient voting power to pass proposals, obtained through various means.
Common governance attack vectors include:
- Flash Loan Voting: Borrow tokens to vote, return after vote executes
- Governance Token Accumulation: Buy enough tokens to control votes
- Delegate Manipulation: Compromise or bribe large delegates
- Proposal Obfuscation: Hide malicious effects in complex proposals
- Quorum Attacks: Pass proposals when participation is low
- Timelock Bypass: Exploit emergency mechanisms to skip delays
Defenses include vote locking, snapshot-based voting, and timelock delays.
Practical Example
Beanstalk suffered a $182 million governance attack in 2022. The attacker took a flash loan, used borrowed governance tokens to pass a malicious proposal, and drained the treasury before returning the loan. The entire attack occurred within a single transaction. Build Finance DAO lost control when an attacker accumulated governance tokens and passed proposals granting themselves minting rights.
Why it Matters
Governance attacks exploit the very mechanisms meant to decentralize control. Protocols must balance accessibility with security, implementing safeguards like vote locking periods, proposal thresholds, and timelock delays. Users should understand governance mechanisms and participation rates before trusting protocols with significant holdings.
Fensory analyzes protocol governance structures and historical voting patterns, helping users understand the security and decentralization of DeFi governance systems.