Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
algorithmic-stablecoins-failures-and-future
Blog

Why Governance Tokens Are a Flash Loan's Favorite Target

Flash loans weaponize capital efficiency against decentralized governance. This analysis dissects how instantaneous, uncollateralized loans turn low-voter-turnout DAOs into centralized exploits, examining past attacks and the flawed economic incentives at play.

introduction
THE VULNERABILITY

The Governance Illusion

Governance tokens are a systemic risk because their voting power is a liquid, tradeable asset divorced from long-term protocol health.

Flash loans weaponize governance. Attackers borrow millions in seconds to temporarily control a DAO's voting power, passing malicious proposals before the loan is repaid. This exploits the fundamental flaw of token-voting: a vote's cost is the token's price, not the protocol's value.

Delegation creates attack surfaces. Protocols like Compound and Uniswap rely on voter apathy, concentrating power with a few delegates. A flash loan attack on a large delegate or a Sybil attack on many small ones bypasses community oversight entirely.

The cost of an attack is negligible. The 2022 Beanstalk Farms hack proved a $1B protocol could be drained for a $250k flash loan. The economic security of MakerDAO or Aave is not its TVL, but the market cap of its freely tradeable governance token.

On-chain voting is irreversible. Unlike corporate governance, Snapshots and Tally-managed votes execute code directly. A passed malicious proposal, like draining a treasury or altering fee parameters, has no circuit breaker once confirmed on-chain.

deep-dive
THE MECHANICS

The Attack Vector: Capital as a Service

Governance token attacks exploit the misalignment between voting power and economic stake, with flash loans providing the temporary capital to weaponize it.

Flash loans decouple voting power from economic risk. An attacker borrows millions in stablecoins, swaps them for a protocol's governance token, votes on a malicious proposal, and repays the loan. The attacker's personal capital is never at stake, making the attack cost the loan fee plus gas.

The vulnerability is the time delay. Protocols like Compound and Uniswap use timelocks between proposal submission and execution. This creates a window where an attacker can borrow, vote, and exit before the malicious change takes effect, leaving the protocol to deal with the aftermath.

The target is the treasury or fee switch. Malicious proposals siphon protocol-controlled value (PCV) or redirect fee revenue. The 2022 Beanstalk Farms hack demonstrated this, where a $1B flash loan acquired 67% of governance votes to drain the $182M treasury.

Evidence: The Beanstalk attack cost ~$250k in flash loan fees to attempt a $182M theft. This 0.14% cost-to-potential-payout ratio defines the asymmetric risk that makes these attacks inevitable for vulnerable protocols.

FLASH LOAN VULNERABILITY ANALYSIS

Notable Governance Attacks & Near-Misses

A comparison of high-profile incidents where attackers used flash loans to manipulate governance token voting power.

Protocol / IncidentAttack DateFlash Loan SourceBorrowed Amount (USD)Attack VectorOutcome

MakerDAO (MKR) - Executive Vote

Nov 2020

dYdX

~$8M

Acquired 13% of MKR supply to pass malicious executive spell.

Failed (spell defeated by community vote)

Alpha Homora (ALPHA)

Feb 2021

dYdX

~$38M

Borrowed to manipulate ALPHA/ETH pool, minting 5.5M ALPHA for governance control.

Successful ($37.5M stolen)

Beanstalk (BEAN)

Apr 2022

Uniswap V2

~$1B

Used borrowed funds to acquire 67% of BEAN liquidity, passed malicious BIP to drain protocol.

Successful ($182M stolen)

Mango Markets (MNGO)

Oct 2022

Solana DEXs

~$10M

Manipulated MNGO perp price to borrow against inflated collateral, gaining voting power over treasury.

Successful ($117M stolen, later returned)

Bancor (BNT) - Near-Miss

Jun 2021

Aave, dYdX

~$10M

Attempted to manipulate BNT/ETH TWAP oracle to drain BNT liquidity pools via governance.

Failed (attack detected and blocked)

Harvest Finance (FARM)

Oct 2020

Uniswap, Curve

~$100M

Used flash loans to manipulate stablecoin pools, profiting from arbitrage bots; governance not directly targeted but exposed economic vulnerability.

Successful ($24M stolen)

counter-argument
THE ARCHITECTURAL FLAW

The Defense: Time-Locks, Delegation, and Futility

Governance token mechanics create predictable attack vectors that flash loans exploit for profit.

Governance tokens are liquid attack vectors. Their on-chain voting power is a financial derivative, priced by the market but executable via flash loans. This creates a temporary, zero-cost option to control a protocol.

Time-locks are a brittle defense. A 48-hour delay, as used by Compound or Uniswap, only protects against surprise. It fails against a public, profitable attack where the attacker profits before the lock expires.

Delegation centralizes the target. Protocols like MakerDAO rely on delegated voting. An attacker borrows tokens from a few large delegates, not thousands of individuals, lowering the capital and coordination barrier.

The attack is economically rational. The profit from passing a malicious proposal—draining the treasury or minting tokens—exceeds the flash loan fee. The bZx and Harvest Finance exploits demonstrated this calculus.

Evidence: The Mango Markets exploit netted $114M by manipulating governance token price to pass a malicious vote, proving that on-chain voting with liquid collateral is inherently vulnerable.

takeaways
GOVERNANCE IS A LIABILITY

TL;DR: The Inescapable Conclusion

Governance tokens are not assets; they are unsecured, on-chain call options that flash loans are designed to exploit.

01

The Problem: Voting Power Is a Liquid Asset

Governance tokens conflate speculative value with protocol control, creating a massive arbitrage opportunity. A flash loan can temporarily rent millions in voting power for the cost of gas, passing proposals that siphon treasury funds or manipulate protocol parameters before the loan is repaid.

  • Cost of Attack: Gas fees only, often <$100k.
  • Time to Execute: A single voting cycle, often 3-7 days.
  • Historical Precedent: See MakerDAO's 2020 'Executive Vote' flash loan attack.
<$100k
Attack Cost
3-7 days
Attack Window
02

The Solution: Time-Locked Governance (veToken Model)

Lock tokens to gain voting power (veTokens). This increases the capital cost of an attack by requiring long-term commitment, not just a temporary loan. Used by Curve Finance and Balancer.

  • Capital Efficiency for Attackers: Plummets. Requires owning, not borrowing.
  • Key Metric: 4-year lock for max power.
  • Trade-off: Creates voter apathy and liquidity lock-up, but it's the current best defense.
4-year
Standard Max Lock
~0
Flash Loan Viability
03

The Problem: On-Chain Execution is Irreversible

A malicious proposal that passes via flash-loaned votes executes autonomously. There is no 'human-in-the-loop' pause button. By the time the community reacts, funds are gone. This makes treasury size a direct risk metric.

  • Target: Protocols with > $100M treasuries.
  • Execution: Instant upon vote conclusion.
  • Example: A proposal to send 10,000 ETH to a new 'contract' that is just an attacker's wallet.
> $100M
High-Risk Treasury
Instant
Damage Done
04

The Solution: Multisig Guardians & Timelocks

Add a human-executed safety layer. A Gnosis Safe multisig of trusted entities holds a veto or pause function, or a timelock delays execution (e.g., Compound's 2-day delay). This creates a reaction window.

  • Reaction Window: 48-72 hours standard timelock.
  • Key Entities: OpenZeppelin Defender, Safe{Wallet}.
  • Trade-off: Introduces centralization, but is necessary for high-value actions.
48-72h
Safety Delay
5/9
Typical Multisig
05

The Problem: Voter Apathy is an Invitation

Low voter turnout (<10% is common) drastically lowers the cost of attack. An attacker only needs to outvote the small, active cohort. Snapshot voting amplifies this by separating signaling from execution.

  • Typical Turnout: <10% of circulating supply.
  • Attack Threshold: Often <5% of total supply to pass a vote.
  • Vector: Borrow 5%, vote, repay. The math is trivial.
<10%
Avg. Turnout
<5%
Attack Threshold
06

The Inescapable Conclusion: Minimize On-Chain Value Control

Governance should control system parameters, not direct treasury assets. The endgame is minimizing the financial payload of any single vote. Use streaming grants (e.g., Sablier), vesting contracts, and delegate treasury management to battle-tested modules.

  • Principle: Governance sets the rules, not the transactions.
  • Tooling: DAO-focused treasuries (Llama, Charm).
  • Future: Fully on-chain governance for high-value assets remains an unsolved risk.
$0
Ideal Vote Payload
100%
Parameter-Only
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Governance Token Attacks: How Flash Loans Break DAOs | ChainScore Blog