Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Cartel Formation

Cartel formation is the coordination of a group of token holders to collectively exert disproportionate influence over decentralized governance outcomes, often leading to centralization.
Chainscore © 2026
definition
BLOCKCHAIN ECONOMICS

What is Cartel Formation?

Cartel formation in blockchain refers to the coordination of validators, miners, or token holders to manipulate network operations for profit, often undermining decentralization and security.

Cartel formation is a strategic coordination among key network participants—such as validators in a Proof-of-Stake (PoS) system or miners in Proof-of-Work (PoW)—to act in a collusive rather than competitive manner. This behavior is a form of governance attack or economic attack where participants align their actions to extract maximal extractable value (MEV), censor transactions, or influence protocol upgrades. Unlike a 51% attack, which is overtly hostile, cartels may operate within the protocol's rules but against its decentralized ethos, creating risks like recentralization and reduced censorship resistance.

The mechanics often involve a subset of actors controlling a significant portion of the staking power or hashrate, enabling them to manipulate block production and transaction ordering. In PoS networks, this could manifest as validator cartels that dominate a delegated proof-of-stake (DPoS) system's governance. The primary incentives are financial, driven by the pursuit of higher staking rewards, MEV extraction through practices like front-running, or securing favorable outcomes in on-chain governance votes. This collusion undermines the Nakamoto Consensus ideal of permissionless, trustless participation.

A canonical example is the potential for liquid staking derivative providers, if overly dominant, to form a cartel by directing the voting power of their pooled assets. The consequences are systemic: cartel formation can lead to increased transaction fees, reduced network security by lowering the cost of attack, and the erosion of credible neutrality. Mitigation strategies are fundamental to protocol design and include slashing penalties for malicious coordination, decentralized validator sets, and anti-correlation penalties that discourage geographic or infrastructural centralization among validators.

how-it-works
MECHANICS

How Does Cartel Formation Work?

Cartel formation in blockchain, specifically within Proof-of-Stake (PoS) networks, is the process by which a group of validators coordinate to control a supermajority of the network's stake, enabling them to manipulate consensus and potentially censor transactions or execute other attacks.

The foundational step in cartel formation is stake accumulation, where a single entity or a coordinated group acquires enough tokens to control a significant portion of the network's total staked value. This can be achieved through direct purchase, leveraging liquid staking derivatives, or forming alliances with other large stakeholders. The critical threshold is typically two-thirds (66.67%) of the total stake, which grants the ability to finalize blocks unilaterally in many PoS systems like Ethereum. Reaching this supermajority transforms the group from a collection of independent validators into a potential cartel with outsized influence over the chain's canonical history.

Once a supermajority is assembled, the cartel must establish coordination mechanisms to act in unison. This involves private communication channels and potentially smart contracts to automate voting or block proposal strategies. The coordination enables attacks such as censorship, where the cartel excludes specific transactions from blocks, or finality delays, where they refuse to finalize blocks containing transactions they wish to revert. In extreme cases, a coordinated cartel could execute a long-range reorganization to rewrite blockchain history, though this is often mitigated by social consensus and slashing penalties designed to disincentivize such malicious coordination.

The economic and social layer provides the final check against cartelization. Slashing conditions are protocol rules that automatically destroy a portion of a validator's staked tokens for provably malicious actions, like double-signing blocks. However, a sufficiently large cartel could theoretically absorb these penalties. Therefore, the ultimate defense is social consensus or fork choice: if a cartel acts maliciously, the broader community of users, exchanges, and node operators can socially coordinate to ignore the cartel-controlled chain, executing a user-activated soft fork (UASF) to slash the offending validators and preserve network integrity, rendering the cartel's stake worthless on the canonical chain.

key-features
CARTEL FORMATION

Key Characteristics of a Governance Cartel

A governance cartel is a coalition of token holders that coordinates voting to control a decentralized protocol's decision-making process. These characteristics define how such cartels form, operate, and maintain power.

01

Vote Concentration

Governance cartels are defined by a high concentration of voting power held by a small, coordinated group. This is often achieved through:

  • Token pooling in a single address or smart contract (e.g., a multi-sig wallet).
  • Delegation of votes from many small holders to a single representative entity.
  • Sybil resistance failure, where one entity controls multiple voting identities. This concentration allows the cartel to pass or veto proposals without needing broad community consensus.
02

Formal or Informal Coordination

Cartels coordinate through explicit agreements or implicit understanding. Formal coordination involves written pacts, shared multi-sig control, or binding smart contracts that pool votes. Informal coordination occurs through off-chain communication channels (e.g., private chats, forums) where members signal voting intentions and align strategies. The key is sustained collaboration to achieve common financial or ideological goals, distinguishing it from one-off voting blocs.

03

Extraction of Value

The primary motive is often to extract value from the protocol in a way that benefits the cartel at the potential expense of other stakeholders. Common methods include:

  • Directing treasury grants or subsidies to cartel-associated projects.
  • Adjusting protocol parameters (like fees or rewards) to favor the cartel's financial positions.
  • Blocking proposals that threaten the cartel's influence or economic advantage. This turns governance from a public good into a private revenue stream.
04

Entrenchment Mechanisms

To maintain power, cartels employ strategies that make them difficult to dislodge. These entrenchment mechanisms include:

  • Proposal gatekeeping: Controlling the proposal submission process or spam-filtering mechanisms to suppress opposition.
  • Increasing the cost of opposition: Raising the token quorum or vote threshold required to pass proposals.
  • Creating dependency: Directing protocol resources to build infrastructure or services that the ecosystem relies on, making their removal disruptive. This creates a feedback loop that solidifies control.
05

Opacity and Legitimacy Challenges

Cartels often operate with a degree of opacity to avoid backlash. While votes are on-chain and transparent, the off-chain coordination and true motives are not. This creates a legitimacy crisis for the protocol, as decisions appear decentralized but are made by a hidden cabal. The gap between the ideal of decentralized governance and the reality of cartel control can erode community trust and participation, leading to voter apathy among non-cartel members.

06

Examples in Practice

Real-world manifestations help identify cartel behavior. Historical analysis points to patterns in major DeFi protocols where a handful of addresses consistently vote together to control outcomes. For instance, a coalition of venture capital funds and large delegates with aligned incentives can form a de facto cartel. Another example is liquidity provider (LP) cartels in Automated Market Maker (AMM) governance, where large LPs coordinate to vote for fee changes that maximize their returns.

security-considerations
BLOCKCHAIN GLOSSARY

Security Risks & Impacts

Cartel formation in blockchain refers to a group of validators or miners colluding to manipulate network operations, undermining decentralization and consensus security.

01

Consensus Manipulation

A validator cartel can collude to censor transactions, reorder blocks, or execute double-spend attacks by controlling a majority of the network's stake or hash power. This directly attacks the Byzantine Fault Tolerance guarantees of protocols like Proof-of-Stake (PoS) or Proof-of-Work (PoW).

02

MEV Extraction Cartels

Validators or searchers can form Maximum Extractable Value (MEV) cartels to coordinate and monopolize profitable opportunities like arbitrage and liquidations. This centralizes profits, increases costs for regular users, and can lead to transaction censorship against non-cartel members.

03

Staking Pool Centralization

In PoS networks, a few large staking pools or liquid staking providers can act as de facto cartels if their combined stake exceeds the slashing threshold. This creates systemic risk, as coordinated action (or failure) by these entities can halt the chain or force governance outcomes.

04

Governance Attacks

Cartels can amass enough voting power (e.g., governance tokens) to control decentralized autonomous organization (DAO) proposals. This allows them to pass proposals that benefit the cartel, such as directing treasury funds or altering protocol parameters to their advantage.

05

Oracle Manipulation

A cartel controlling a critical decentralized oracle network can collude to report false price data. This can be used to trigger undercollateralized loans in lending protocols or incorrect settlement in derivatives markets, leading to massive, coordinated exploits.

06

Mitigations & Detection

Protocols implement defenses such as:

  • Anti-correlation penalties in PoS (slashing for coordinated voting).
  • Distributed Validator Technology (DVT) to decentralize single nodes.
  • MEV smoothing and fair ordering mechanisms. Detection often involves analyzing stake distribution and voting patterns for abnormal coordination.
GOVERNANCE STRUCTURES

Cartel vs. Legitimate Governance Coalition

A comparison of the defining characteristics of collusive cartels versus transparent, protocol-aligned governance coalitions.

FeatureCartelLegitimate Governance Coalition

Primary Objective

Maximize extractable value for members

Maximize long-term protocol health and value

Coordination Mechanism

Opaque, off-chain agreements (e.g., private chats)

Transparent, on-chain proposals and forum discussions

Voting Behavior

Sybil attacks, vote-buying, and pre-vote collusion

Independent analysis and voting based on public rationale

Value Flow

Extractive: Value flows from protocol/users to cartel

Generative: Value is reinvested into protocol development and treasury

Transparency

Low: Membership and motives are hidden

High: Delegation statements and funding sources are public

Long-Term Sustainability

Low: Incentivizes rent-seeking and protocol decay

High: Incentivizes positive-sum growth and upgrades

Typical On-Chain Signal

Sudden, large, coordinated vote swings with no discussion

Gradual vote alignment following extensive public debate

Legal & Reputational Risk

High: Potential for regulatory action and community backlash

Low: Operates within the protocol's designed governance framework

examples
CARTEL FORMATION

Notable Examples & Case Studies

Cartel formation in decentralized finance (DeFi) refers to the collusion of validators, miners, or large token holders to manipulate protocol outcomes for profit, undermining decentralization and fairness. These case studies illustrate the mechanisms and consequences of such coordination.

01

The Lido DAO & stETH Dominance

While not a malicious cartel, the Lido DAO's control over ~30% of all staked Ethereum has raised centralization concerns, creating a potential single point of failure. This dominance illustrates how a cooperative of stakers can achieve a super-majority influence over network consensus, prompting debates about the social slashing of large staking pools to preserve decentralization.

~30%
of Staked ETH
02

MEV-Boost Relay Cartels

Etherean validators using MEV-Boost rely on a small set of relays to receive blocks from searchers. This created a risk of relay-level cartelization, where a few dominant relays could:

  • Censor transactions by excluding certain blocks.
  • Extract maximum extractable value (MEV) for themselves.
  • Control the flow of block proposals, threatening validator neutrality. This led to efforts to diversify and decentralize the relay landscape.
03

Proof-of-Work Mining Pools

Historical Bitcoin and Ethereum mining pools like GHash.io briefly exceeded 51% of the network hash rate, demonstrating a clear cartel formation risk. This concentration allowed the pool operator to theoretically:

  • Execute double-spend attacks.
  • Censor transactions.
  • Destabilize network trust. The community response often involved miners voluntarily leaving the pool to defend network security, a form of decentralized anti-cartel action.
04

DeFi Governance Attacks ("Governance Cartels")

In protocols like Curve Finance and Compound, large token holders ("whales") can form governance cartels to pass proposals that benefit themselves at the expense of smaller holders. This includes:

  • Directing emission rewards (CRV, COMP) to their own liquidity pools.
  • Adjusting fee parameters to their advantage.
  • The defense against this is often vote-locking mechanisms (e.g., veTokenomics) that align long-term incentives.
05

Cross-Chain Bridge Validator Sets

Many cross-chain bridges rely on a small, permissioned set of validators or multisig signers to attest to asset transfers. These sets are inherently centralized and can collude as a cartel to:

  • Halt withdrawals, freezing user funds.
  • Mint unauthorized assets on the destination chain, leading to insolvency.
  • Steal all bridged assets. High-profile bridge hacks like the Wormhole and Ronin Bridge exploits exploited this validator set weakness.
06

The "Dark Forest" of MEV Searchers

While competitive, MEV searchers sometimes engage in tacit collusion or form temporary cartels (e.g., via off-chain communication) for complex, multi-block arbitrage opportunities. This coordination allows them to:

  • Share profits on large, risky trades.
  • Avoid bidding wars that would erode their margins.
  • Execute time-bandit attacks or sandwich attacks more efficiently, extracting value from regular users.
mitigation-strategies
CARTEL FORMATION

Mitigation Strategies & Defenses

Cartel formation in blockchain, particularly in proof-of-stake and DeFi, occurs when validators or liquidity providers collude to manipulate protocol outcomes. These strategies focus on detecting and disincentivizing such collusion.

01

Cryptoeconomic Penalties (Slashing)

Imposing severe financial penalties on validators who exhibit provable, coordinated malicious behavior. This is a primary defense in Proof-of-Stake networks.

  • Slashing Conditions: Penalties are triggered for actions like double-signing blocks or voting for conflicting checkpoints, which are hallmarks of cartel attacks.
  • Example: Ethereum's consensus layer slashes a validator's entire stake for attestation violations, making collusion economically irrational.
02

Decentralized Validator Selection

Using randomized, unpredictable mechanisms to select block proposers and committee members, preventing cartels from reliably controlling the chain.

  • Randao & VDFs: Ethereum uses RANDAO for pseudorandomness, with future plans for Verifiable Delay Functions (VDFs) to increase unpredictability.
  • Tendermint's Proposer Rotation: A round-robin style that, while deterministic, limits any single validator's consecutive control.
03

Anti-Collusion Fork Choice Rules

Designing consensus rules that are resilient to coordinated voting blocs. The Gasper protocol (Ethereum 2.0) uses LMD-GHOST and Casper FFG to finalize chains based on attestation weight, making it costly for a cartel to attack without controlling a supermajority (>2/3) of stake.

04

Decentralized Governance Safeguards

Implementing governance mechanisms resistant to vote-buying and collusion in DAOs and DeFi protocols.

  • Conviction Voting: Allocates voting power based on the duration tokens are locked, reducing the impact of short-term cartel raids.
  • Holographic Consensus: Uses futarchy and prediction markets to reach decisions, separating economic interest from direct voting power.
  • Example: MolochDAO uses rage-quit mechanisms, allowing dissenting members to exit with funds if a malicious proposal passes.
05

MEV Mitigation & Fair Ordering

Reducing the profitability of Miner/Validator Extractable Value (MEV), a key incentive for validator cartels to form and manipulate transaction ordering.

  • Proposer-Builder Separation (PBS): Separates the role of block building from proposing, distributing power and reducing single-entity control.
  • Encrypted Mempools & Fair Sequencing Services: Protocols like Shutter Network use threshold encryption to prevent frontrunning, a common cartel tactic.
BLOCKCHAIN ECONOMICS

Common Misconceptions About Cartels

In blockchain, the term 'cartel' is often misapplied to describe any coordinated group behavior. This section clarifies the precise economic and technical definitions, separating legitimate coordination from anti-competitive collusion.

A cartel in blockchain economics is a formal, explicit agreement between independent network participants (like validators, miners, or large token holders) to coordinate their actions to manipulate market outcomes, typically to increase profits at the expense of other users. This differs from loose, public coordination or protocol-aligned incentives. A true cartel operates opaquely to restrict output, fix prices (like transaction fees), or control network governance in a way that reduces overall welfare. For example, a validator cartel might collude to censor transactions or extract maximal MEV (Miner Extractable Value) by reordering blocks, violating the protocol's intended trustless and permissionless properties.

CARTEL FORMATION

Frequently Asked Questions

Cartel formation in blockchain refers to the coordination of validators or miners to manipulate network operations for profit, undermining decentralization and security. These FAQs address its mechanisms, consequences, and mitigation strategies.

A blockchain cartel is a coordinated group of validators, miners, or stakeholders that collude to manipulate a decentralized network's operations for collective profit, often at the expense of other participants. It forms when a subset of network actors, controlling a significant portion of the hash power (Proof of Work) or stake (Proof of Stake), coordinates its actions outside the protocol's intended design. This coordination can be explicit through private communication or implicit through shared financial incentives. Cartels exploit their aggregated influence to perform actions like transaction censorship, MEV extraction, or manipulating block proposal order, effectively creating a centralized point of control within a supposedly decentralized system.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Cartel Formation: Definition & Impact on DAO Governance | ChainScore Glossary