Proposal spam is a form of governance attack where a malicious actor floods a decentralized autonomous organization (DAO) or blockchain network with a high volume of low-quality, duplicate, or nonsensical governance proposals. The primary goal is to disrupt the governance process by overwhelming participants, making it difficult to find and vote on legitimate proposals, and exhausting the community's attention and resources. This attack exploits the permissionless or low-cost nature of submitting proposals on many platforms.
Proposal Spam
What is Proposal Spam?
A malicious tactic that floods a decentralized governance system with low-quality or duplicate proposals to disrupt its operation.
The mechanics of proposal spam often involve creating numerous proposals with trivial content or copying existing ones. This floods the proposal queue or forum, causing voter fatigue and governance paralysis. Key vulnerabilities exploited include low or zero proposal submission fees, lack of effective spam filters, and sybil-resistant identity systems. The attack can be a prelude to a more serious exploit, as a distracted community may fail to notice a malicious proposal hidden within the spam.
Common consequences include increased transaction costs for the DAO treasury (if fees are paid to the protocol), reduced voter participation due to frustration, and delayed execution of critical protocol upgrades or treasury allocations. In severe cases, it can render a governance system temporarily unusable, undermining the core decentralized decision-making principle. This highlights the tension between permissionless participation and operational security in on-chain governance.
Protocols implement several anti-spam mechanisms to mitigate this risk. These include: - Proposal submission deposits that are forfeited if the proposal fails. - Minimum token thresholds for creating proposals. - Delegated submission through elected stewards or committees. - Pre-proposal discussion forums where ideas are vetted before an on-chain vote. - Time-based cooldowns between submissions from the same address. The design of these mechanisms is crucial to balance accessibility with resilience.
A historical example is the attempted spam attack on the Compound Finance governance system in 2021, where an attacker submitted hundreds of duplicate proposals. Because Compound required a minimum of 65,000 COMP tokens to propose, the attacker borrowed funds to meet the threshold, submitted the spam, and then repaid the loan. This incident demonstrated that even systems with significant economic barriers are not immune to sophisticated spam tactics that utilize flash loans or other DeFi primitives.
Analyzing proposal spam is essential for governance security. It represents a low-cost, high-impact attack vector that tests the procedural integrity of a DAO. Robust defense requires a layered approach combining economic disincentives, social coordination layers (like forums), and technical filters. As governance controls more valuable assets, the incentive for such disruptive attacks increases, making spam resistance a critical component of sustainable decentralized governance design.
How Proposal Spam Works
Proposal spam is a governance attack vector where malicious actors flood a decentralized autonomous organization (DAO) with low-quality or malicious proposals to disrupt operations and exploit systemic weaknesses.
Proposal spam, also known as governance spam, functions by exploiting the inherent cost and process structures of on-chain governance. An attacker submits a high volume of proposals—often nonsensical, duplicate, or designed to create confusion—to overwhelm the community's ability to review and vote effectively. The primary mechanisms enabling this attack are low or non-existent proposal submission costs and a lack of effective pre-screening mechanisms like a proposal threshold or a timelock before voting begins. This floods the governance interface, creating voter fatigue and obscuring legitimate proposals.
The attacker's goals are typically multifaceted: to dilute voter attention, making it harder for good proposals to pass; to test governance resilience for future exploits; or to profit directly by including malicious code within the spam, hoping it passes during the chaos. For example, a spam proposal might request a trivial treasury spend or a minor parameter change, but buried in its calldata could be a function that grants the attacker special privileges or drains funds. This tactic relies on voter apathy or automated voting systems that may not scrutinize every proposal's details.
The technical execution often involves automated scripts or bots to submit proposals rapidly, leveraging the low gas costs on the underlying blockchain. The spam creates a denial-of-service (DoS) condition for the governance process. Legitimate delegates and token holders must then spend disproportionate time and resources to analyze each proposal, a process known as governance overhead. If the system uses a snapshot of token holdings at a specific block for voting, spam can also be timed to target periods of low community engagement.
Mitigation strategies are critical for DAO security. Common defenses include implementing a meaningful proposal deposit (slashed if the proposal fails), establishing a proposal threshold (a minimum token balance required to submit), and introducing a forum signaling or temperature check phase off-chain before any on-chain proposal is made. More advanced systems use delegate curation, where trusted delegates pre-vet proposals, or futarchy, which uses prediction markets to assess proposal outcomes. The constant evolution of proposal spam necessitates that governance frameworks be designed with spam resistance as a first-principle consideration.
Key Characteristics of Proposal Spam
Proposal spam in decentralized governance is characterized by several distinct patterns that distinguish it from legitimate governance activity. Recognizing these traits is essential for maintaining functional and efficient DAO operations.
Low-Quality or Vague Content
Spam proposals often lack substantive detail, technical specifications, or a clear ask. They may be characterized by:
- Ambiguous language with no concrete implementation plan.
- Copy-pasted templates or generic text with minimal customization.
- Missing critical components like budget breakdowns, timelines, or success metrics.
- Example: A proposal titled "Marketing Boost" with only a single sentence: "We should do more marketing."
Sybil Attacks & Vote Farming
This involves creating a large number of fake or low-stake identities to manipulate proposal visibility and outcomes.
- Sybil identities are used to meet proposal submission thresholds or create artificial discussion.
- Vote farming leverages airdropped or borrowed governance tokens to create the illusion of community support.
- The goal is often to dilute signal from legitimate proposals or to push through malicious changes under the cover of noise.
Financial Extraction Attempts
A primary motive is the direct or indirect extraction of treasury funds with little to no promised value in return.
- Proposals for excessive grants or salaries with no clear deliverables or oversight.
- "Tip jar" proposals that request funds for vague past contributions.
- Proposals that funnel funds to newly created or obscure entities controlled by the submitter.
- These often rely on voter apathy or fatigue to pass.
Disruption of Governance Process
Spam is designed to overload and degrade the governance system itself.
- Flooding the forum and snapshot with proposals to drown out legitimate discourse.
- Exploiting proposal thresholds to force votes on trivial or nonsensical matters, causing voter fatigue.
- Wasting contributor time as community members must review, discuss, and vote on low-signal content.
- This can paralyze a DAO's decision-making capacity.
Common Technical Vectors
Spammers use specific on-chain and off-chain methods to execute their campaigns.
- On-chain: Spamming the blockchain with proposal creation transactions to increase gas costs for others.
- Off-chain: Automating forum post creation using bots to simulate discussion.
- Governance Mining: Repeatedly submitting similar proposals to farm any potential participation rewards.
- Cross-DAO Spam: The same individual or group targets multiple DAOs with identical, low-effort proposals.
Mitigation Strategies
DAOs employ various mechanisms to filter out spam and protect governance integrity.
- Proposal Deposits: Requiring a bond (in native tokens) to submit, which is forfeited if the proposal fails.
- Reputation Gates: Using proof-of-personhood systems or social graph analysis to limit submissions.
- Delegated Moderation: Empowering a council or sub-DAO to curate and filter proposals before a full vote.
- Staked Voting: Implementing conviction voting or time-locked votes to increase the cost of spam.
Motivations and Attack Goals
Proposal spam is a governance attack where an adversary floods a DAO's voting system with low-quality or malicious proposals to disrupt operations and achieve specific goals.
Disruption and Paralysis
The primary goal is to overwhelm the governance process, causing voter fatigue and making it impossible for legitimate proposals to receive adequate attention or quorum. This can paralyze a DAO, preventing protocol upgrades, treasury management, or critical parameter changes.
- Tactics: Submitting many proposals with trivial or nonsensical content.
- Impact: Legitimate governance is drowned out, halting progress.
Financial Extraction
Attackers may use spam to pass malicious proposals disguised as legitimate ones. By flooding the system, they reduce scrutiny, increasing the chance a harmful proposal slips through. The goal is direct financial gain.
- Common Vectors: Proposals to drain the treasury, mint excessive tokens, or change fee parameters to benefit the attacker.
- Example: The 2022 Beanstalk Farms exploit involved a malicious governance proposal that passed during a flash loan attack, resulting in a $182M loss.
Cost Inflation and Griefing
This attack aims to impose excessive costs on other participants. In systems where submitting or voting on proposals requires gas fees or locked capital, spam forces legitimate voters to spend significant resources to defend the status quo.
- Mechanism: Forces token holders to pay repeatedly to vote 'No' on spam.
- Goal: Griefing—imposing costs without direct profit—or depleting a competitor's war chest.
Reputation Damage and Chaos
Spam can be used to damage the reputation of a protocol by creating a public perception of dysfunction and chaos. This can erode community trust, drive away developers, and negatively impact the token price.
- Tactic: Creating proposals that are offensive, divisive, or highlight protocol vulnerabilities.
- Secondary Effect: Creates information asymmetry, where savvy attackers can exploit the confusion for other gains.
Sybil Attack Vector
Proposal spam is often executed via Sybil attacks, where an attacker creates many fake identities (Sybils) to meet proposal submission thresholds or simulate grassroots support. This bypasses token-weighted defenses.
- Prerequisite: Governance models with low-cost or 1-token-1-vote submission requirements are vulnerable.
- Combination: Sybil spam can be used to trigger snapshot voting on many fronts simultaneously.
Related Concepts
Understanding proposal spam requires knowledge of adjacent governance mechanisms and attacks.
- Governance Capture: The long-term goal of acquiring enough voting power to control decisions, of which spam can be a tactic.
- Vote Sniping: Last-minute voting manipulation that spam can obscure.
- Quorum: The minimum participation threshold spam aims to make unattainable.
- Bonding Curves: A common anti-spam measure requiring a financial deposit to submit a proposal.
Real-World Examples and Case Studies
Examining historical incidents of proposal spam reveals the tactics used, their impact on governance, and the defensive mechanisms developed in response.
The Compound Finance "Troll" Proposal
In 2021, a user submitted a proposal to Compound's governance forum titled "Troll," which contained no substantive content. This was a deliberate test of the proposal submission cost mechanism. The incident highlighted how a low-cost submission process could be exploited to flood the forum with nonsense, forcing the community to waste time filtering noise. It underscored the need for minimum proposal thresholds or deposit requirements to ensure serious submissions.
Uniswap's Temperature Check Spam
Uniswap's Snapshot-based temperature check stage has been targeted by spam proposals aiming to manipulate sentiment or test governance participation. Attackers create multiple low-effort proposals with similar titles to confuse voters and dilute attention from legitimate initiatives. This demonstrates how off-chain voting platforms without significant economic costs are particularly vulnerable to sybil attacks and spam, necessitating reputation systems or delegated voting to maintain signal quality.
The MakerDAO "Governance Attack" Simulation
A 2022 simulation by security researchers outlined a governance attack vector where an attacker could spam the voting portal with a high volume of proposals during a critical moment. The goal was to obfuscate a malicious proposal among the spam, hoping it would pass unnoticed due to voter fatigue. This case study is a classic example of using spam as a smokescreen, leading to the implementation of timelocks and mandatory executive vote delays to provide a review period.
Curve Finance & veTokenomics as a Defense
Curve's veToken model (vote-escrowed tokens) inherently combats proposal spam by requiring users to lock their CRV tokens for long periods to gain voting power. This creates a high economic cost for attempting to spam the governance system, as an attacker's capital is immobilized. The system ensures that proposal creators and voters have skin in the game, making frivolous or malicious proposals economically irrational. This is a prime example of cryptoeconomic design solving the spam problem.
Aragon's Proposal Deposit Framework
The Aragon client implements a formal proposal deposit system, where submitting a governance action requires staking a configurable amount of the native token. This deposit is slashed if the proposal fails to meet a minimum participation or approval threshold. This mechanism directly attaches a financial disincentive to spam, ensuring that only proposals with anticipated community support are submitted. It represents a clear, on-chain solution to the proposal spam problem.
Common Defense Mechanisms
Proposal spam is a governance attack where malicious actors flood a DAO with low-quality or malicious proposals to disrupt operations, waste community attention, and potentially pass harmful measures. These defenses are critical for maintaining functional on-chain governance.
Voting Quorums & Thresholds
Minimum participation requirements a proposal must meet to be considered valid and executable. These create a high bar for spam proposals to clear.
- Quorum: The minimum percentage of the total voting power that must participate in a vote for the result to be valid (e.g., 4% of all tokens).
- Approval Threshold: The minimum percentage of 'Yes' votes required for passage (e.g., 51% for a simple majority, 67% for a supermajority). Spam proposals typically fail to attract meaningful participation, causing them to fail quorum.
Proposal Threshold
A minimum token ownership requirement to submit a proposal. This restricts proposal creation to stakeholders with significant skin in the game, as they are economically aligned with the protocol's success. For instance, a DAO may require a proposer to hold 0.5% of the governance token supply. This prevents Sybil attackers from creating infinite spam proposals without first acquiring a costly stake.
Delegation & Representative Voting
A system where token holders delegate their voting power to trusted experts or delegates. This concentrates voting power into fewer, more attentive hands, making it harder for spam to go unnoticed. Delegates, who often have reputational capital at stake, are incentivized to filter out noise and vote seriously. This reduces voter fatigue and increases the quality of governance participation.
Pre-Proposal Forums & Temperature Checks
An off-chain, informal discussion phase required before an on-chain proposal can be submitted. Proposers must first post their idea on a forum (like Discourse or Commonwealth) to gather community sentiment via polls and feedback. This social consensus layer filters out clearly unpopular or spammy ideas before they consume on-chain gas and formal voting attention. Many DAOs enforce this as a mandatory step in their governance process.
Proposal Spam vs. Legitimate Proposal
Key characteristics distinguishing malicious or low-quality governance proposals from valid, constructive ones.
| Feature | Proposal Spam | Legitimate Proposal |
|---|---|---|
Primary Intent | Disrupt governance or extract value | Improve protocol or community |
Economic Rationale | None or purely extractive | Clear, net-positive value proposition |
Technical Detail | Vague, copy-pasted, or absent | Specific, with clear implementation path |
Voter Engagement | Relies on apathy or confusion | Seeks informed discussion and debate |
On-Chain Impact | Clogs mempool, wastes gas | Targeted, efficient state change |
Funding Request | Disproportionate to scope | Justified and often milestone-based |
Community Sentiment | Overwhelmingly negative | Constructive discussion, mixed support |
Frequently Asked Questions (FAQ)
Proposal spam is a governance attack vector where malicious actors flood a DAO with low-quality or malicious proposals to disrupt operations. This section answers common questions about its mechanics, impacts, and defenses.
Proposal spam is a governance attack where an actor submits a high volume of low-quality, frivolous, or malicious proposals to a Decentralized Autonomous Organization (DAO) with the intent to disrupt its operations. The primary goal is to create governance fatigue, overwhelming token holders and core contributors with the cognitive load and gas costs of reviewing and voting, thereby paralyzing the decision-making process. Attackers may also use spam to bury a legitimate, critical proposal in a sea of noise, ensuring it doesn't get the attention or quorum required to pass. This tactic exploits the permissionless or low-barrier nature of proposal submission in many DAO frameworks.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.