In the context of Decentralized Autonomous Organizations (DAOs) and on-chain governance, a voting strategy is the computational logic that translates a user's holdings or status into quantifiable voting power. It is a core component of governance frameworks like Snapshot, OpenZeppelin Governor, and Aragon. Instead of a simple one-token-one-vote model, strategies enable complex mechanisms such as quadratic voting, delegation, time-weighted balances, or multi-token governance. The strategy is executed off-chain for gasless voting or on-chain for binding execution, calculating a voter's influence at the precise block or timestamp of a proposal's creation.
Voting Strategy
What is a Voting Strategy?
A voting strategy is a predefined set of rules or a smart contract that determines how voting power is calculated and allocated in a decentralized governance system, often based on token ownership, delegation, or other on-chain credentials.
Common voting strategy types include token-weighted (power proportional to token balance), delegated (power from other users' delegated tokens), quadratic (power is the square root of tokens to reduce whale dominance), and NFT-based (power granted by owning a specific non-fungible token). Advanced strategies can combine multiple factors, such as a user's time-locked tokens (ve-tokens) or their activity within a protocol, creating sybil-resistant and aligned governance systems. These strategies are defined in a manifest or smart contract that governance platforms query to determine each address's voting weight for a specific proposal.
The choice of voting strategy directly shapes a protocol's governance security and inclusivity. A well-designed strategy balances influence among stakeholders, mitigates manipulation risks like vote buying or sybil attacks, and aligns voter incentives with the protocol's long-term health. For example, Curve Finance's veCRV model uses a time-lock strategy to grant boosted voting power to long-term token lockers, while Gitcoin Grants employs quadratic funding strategies to democratize allocation. Developers implement these strategies by deploying custom contract logic that adheres to standard interfaces, allowing governance platforms to compute voting power dynamically and transparently for every proposal.
Key Features of Voting Strategies
Voting strategies are the rule sets that determine how voting power is allocated and aggregated within a decentralized governance system. The choice of strategy fundamentally shapes a DAO's decision-making process and security.
Token-Weighted Voting
The most common strategy where voting power is directly proportional to the quantity of governance tokens held. This aligns influence with economic stake but can lead to plutocracy.
- Example: A user with 100 tokens has 100 votes.
- Use Case: Foundational for protocols like Uniswap and Compound.
- Trade-off: Simple to implement but susceptible to vote buying and whale dominance.
Quadratic Voting
A mechanism designed to reduce whale dominance by making the cost of votes increase quadratically. Voting power is the square root of the tokens committed.
- Mechanism: 1 token = 1 vote, 4 tokens = 2 votes, 100 tokens = 10 votes.
- Goal: To better reflect the intensity of preference among a diverse group.
- Challenge: Requires robust sybil resistance to prevent users from splitting tokens across multiple addresses.
Delegated Voting
A representative model where token holders can delegate their voting power to a trusted third party or expert. This reduces voter apathy and centralizes expertise.
- Example: Compound and Uniswap allow delegation to individuals or entities.
- Benefit: Enables informed participation without requiring constant engagement from all holders.
- Risk: Can lead to the formation of centralized power blocs or cartels.
Conviction Voting
A time-based strategy where voting power accumulates the longer a voter supports a proposal. It is designed for continuous funding decisions, not simple yes/no votes.
- Mechanism: Votes are staked on proposals; influence grows over time but is withdrawn immediately if switched.
- Use Case: Pioneered by 1Hive for community grant funding.
- Advantage: Filters for proposals with sustained, organic support and allows for dynamic prioritization.
Multisig & Permissioned Voting
A strategy where voting power is restricted to a predefined set of addresses, typically a multi-signature wallet controlled by a council or founding team. This is common in early-stage DAOs.
- Mechanism: Proposals execute only after a threshold (e.g., 4-of-7) of keyholders sign the transaction.
- Phase: Often used as a starter governance model before transitioning to token-based voting.
- Characteristic: Efficient but centralized, trading decentralization for execution speed and security.
Holographic Consensus
An advanced strategy that uses a prediction market to pre-filter proposals. Delegates stake tokens to "boost" proposals they believe will pass, fast-tracking them to a main vote.
- Process: Combines futarchy elements with delegated voting.
- Goal: Increases governance scalability by only putting high-confidence proposals to a full token vote.
- Implementation: Used by DAOstack's Alchemy platform to manage proposal throughput.
How a Voting Strategy Works
A voting strategy is the computational logic that determines a user's voting power in a decentralized governance system, typically by querying on-chain data to calculate token holdings or other qualifying assets.
In decentralized autonomous organizations (DAOs) and on-chain governance platforms like Snapshot, a voting strategy is not a single rule but a modular smart contract or off-chain function. Its core function is to answer a single question at a specific block number: "How much voting power does this address possess?" This calculation forms the foundation for weighted voting, where influence is proportional to a user's stake or contribution, as opposed to one-person-one-vote systems. Strategies are defined per proposal, allowing DAOs to tailor governance participation to different asset types or metrics.
Common voting strategies include the token-weighted strategy, which calculates power based on balances of a specific ERC-20 or ERC-721 token, and the multisig-owner strategy, which grants power to signers of a multisig wallet. More complex strategies can compute delegated voting power from systems like Compound or Uniswap, factor in time-locked tokens (ve-tokens), or even measure contributions in a proof-of-personhood system. The strategy fetches this data from the blockchain state at a predetermined snapshot block, ensuring a fixed and tamper-proof record of eligible voters.
The technical implementation involves a getVotingPower function that takes a voter's address, a snapshot block number, and optional parameters, then returns an integer representing their power. On Snapshot, these strategies are written in TypeScript and executed off-chain for gasless voting, while on-chain governance systems integrate them directly into smart contract logic. This modularity allows a single proposal to use multiple strategies—for example, combining native token holdings with NFT ownership—where the final voting power is the sum or another aggregate of the individual strategy outputs.
Proper strategy design is critical for governance security and fairness. A flawed strategy can lead to vote manipulation, such as token borrowing (flash-loan attacks) if the snapshot is not securely pinned, or sybil attacks if identities are not properly weighted. Therefore, strategies often incorporate mitigations like using a block number from several blocks in the past to prevent last-minute manipulation, or integrating with sybil-resistance protocols. The choice of strategy fundamentally shapes the governance constituency and the distribution of power within a protocol.
Common Types of Voting Strategies
Voting strategies are the specific rules and mechanisms that determine how voting power is allocated and aggregated in on-chain governance systems.
Token-Weighted Voting
The most common strategy where voting power is directly proportional to the number of governance tokens held. This creates a one-token, one-vote system. It's simple to implement but can lead to plutocracy, where large token holders (whales) have disproportionate influence. Examples include early Compound and Uniswap governance.
Quadratic Voting
A mechanism designed to reduce the power of large stakeholders. A voter's influence scales with the square root of the tokens committed (cost = votes²). This makes it exponentially more expensive to cast many votes, favoring a broader distribution of opinion. It was pioneered in Gitcoin Grants and explored by projects like Optimism for public goods funding.
Conviction Voting
A continuous voting system where voting power accrues over time as tokens are staked on a proposal. This measures the sustained intensity of support, not just a snapshot. It allows for dynamic prioritization and is well-suited for funding DAO treasuries, as seen in Commons Stack and 1Hive Gardens.
Delegated Voting
A representative model where token holders can delegate their voting power to a trusted expert or representative. This reduces voter apathy and leverages expertise, similar to a parliamentary system. It is a core feature of Compound and Uniswap governance, where delegates actively debate and vote on proposals.
Holographic Consensus / Forking
A strategy that uses prediction markets or forks to gauge sentiment. Voters signal by staking tokens on likely outcomes. If a proposal gains enough support, it can bypass a full vote via a ragequit-style fork mechanism, as conceptualized in Moloch DAOs. It prioritizes high-signal, high-conviction proposals.
Multisig / Council Voting
Voting power is restricted to a predefined set of addresses, typically a multisignature wallet controlled by a council or core team. This is a common early-stage governance model for speed and security before full decentralization. It is not token-weighted but based on peer approval among key signers.
Ecosystem Usage & Protocol Examples
Voting strategies are the computational logic that determines voting power in decentralized governance, moving beyond simple token-weighted models to enable more sophisticated and inclusive decision-making.
Token-Weighted Voting
The most common strategy where voting power is directly proportional to the quantity of a governance token held. This aligns influence with economic stake but can lead to plutocracy.
- Examples: Uniswap (UNI), Compound (COMP), Aave (AAVE).
- Mechanism: 1 token = 1 vote, often with delegation options.
- Limitation: Susceptible to vote buying and whale dominance.
Quadratic Voting
A strategy designed to reduce the power of large token holders by making the cost of votes increase quadratically. It aims to reflect the intensity of preference within a community.
- Concept: Cost = (Number of Votes)². Buying 2 votes costs 4 credits, 3 votes costs 9 credits.
- Implementation: Used by Gitcoin Grants for funding allocation to measure community sentiment.
- Goal: Protects against sybil attacks and whale dominance when combined with identity verification.
Conviction Voting
A continuous, time-based voting model where voting power accrues the longer a voter supports a proposal. It is designed for ongoing funding decisions in DAO treasuries.
- Mechanism: Users stake tokens on proposals. Voting power increases over time, but is withdrawn immediately if they change their vote.
- Primary Use: Commons funding in DAOs like 1Hive Gardens.
- Advantage: Filters for proposals with sustained, organic community support and allows for dynamic prioritization.
Delegated Voting & Liquid Democracy
A system where token holders can delegate their voting power to representatives or experts, who then vote on their behalf. This balances direct democracy with representative efficiency.
- Examples: ENS DAO (delegates), Optimism Collective (Citizen House delegates).
- Flexibility: Delegation can be specific to a topic (e.g., treasury management) or broad, and is revocable at any time.
- Benefit: Reduces voter apathy and leverages subject-matter expertise within the community.
Multisig & Guardian Models
A strategy where voting power is concentrated among a small, trusted group of signers (a multisig) or a dedicated security council. This prioritizes security and execution speed over broad decentralization.
- Use Case: Common for protocol upgrades and emergency actions in early-stage projects or layer-2 rollups (e.g., Arbitrum's Security Council).
- Mechanism: Proposals require M-of-N signatures from pre-approved addresses.
- Trade-off: Creates a more centralized point of control but mitigates coordination failure.
Non-Token Based Strategies
Strategies that decouple governance rights from financial stake, using alternative metrics to allocate voting power. This aims to better align influence with contribution or participation.
- Proof-of-Personhood: One-person-one-vote systems using verified unique identities (e.g., Worldcoin's Proof of Personhood).
- Reputation-Based: Voting power based on non-transferable reputation scores earned through contributions (pioneered by Colony).
- NFT-Based: Ownership of a specific non-financial NFT (e.g., a membership pass) grants voting rights.
Voting Strategy Comparison
A technical comparison of common mechanisms for aggregating and recording voter preferences in DAOs and decentralized protocols.
| Feature / Metric | Token-Weighted | Quadratic Voting | Conviction Voting |
|---|---|---|---|
Core Mechanism | One token, one vote | Cost scales quadratically with vote weight | Voting power accrues over time |
Sybil Resistance | |||
Capital Efficiency | High | Low | Medium |
Vote Finality | Immediate | Immediate | Delayed (Dynamic) |
Gas Cost per Vote | Low | High | Medium to High |
Whale Influence | High | Mitigated | Temporally Mitigated |
Typical Use Case | Protocol parameter votes | Public goods funding | Continuous budgeting |
Security & Game Theory Considerations
Voting strategies in decentralized governance are mechanisms that determine how voting power is allocated and aggregated. Their design is critical for network security, resistance to manipulation, and ensuring outcomes reflect genuine stakeholder intent.
Sybil Resistance
A core security property that prevents a single entity from creating many fake identities (Sybil attacks) to gain disproportionate voting power. Strategies achieve this by linking voting power to a scarce, costly-to-acquire resource, such as:
- Token ownership (1 token = 1 vote)
- Locked capital (e.g., ve-token models)
- Reputation or soulbound tokens (non-transferable identity)
Vote Buying & Bribery
A major game-theoretic attack where a party offers direct compensation to token holders to vote a specific way, undermining the governance's integrity. Counter-strategies include:
- Secret voting (e.g., zk-SNARKs) to hide votes until they are committed.
- Conviction voting, which requires a time-lock to amplify voting power, making bribery less efficient.
- Minimal anti-collusion infrastructure designed to detect and penalize coordinated bribery.
Whale Dominance
The risk that a small number of large token holders (whales) can unilaterally dictate governance outcomes, leading to centralization and potential tyranny of the majority. Mitigations include:
- Quadratic voting, where cost scales quadratically with votes cast, favoring broad consensus.
- Delegation to knowledgeable, smaller stakeholders.
- Vote escrow models that reward long-term commitment over sheer capital.
Voter Apathy & Rational Ignorance
The economic reality where the cost for a token holder to become informed on a proposal outweighs the marginal benefit of their single vote, leading to low participation. Strategies to combat this include:
- Delegative democracy (liquid democracy), where users can delegate votes to experts.
- Bonded voting or skin-in-the-game models that require depositing funds, aligning voter incentives with outcomes.
- Gasless voting via meta-transactions to reduce participation costs.
Proposal Inertia & Timelocks
Security mechanisms that introduce deliberate delays between a vote passing and its execution. This protects the protocol by providing a final safeguard against malicious proposals that have passed due to a short-term attack. Key aspects:
- A timelock period allows the community to react (e.g., exit funds) if a harmful proposal passes.
- Creates a cooling-off period for critical decisions, enabling review and potential veto through social consensus or fork.
Forking as Ultimate Recourse
In blockchain governance, the ability for a dissenting minority to fork the protocol—creating a new chain with different rules—is the ultimate game-theoretic backstop. This influences strategy by:
- Imposing a cost of exit on the majority; if they act maliciously, they risk losing network value to a fork.
- Making governance less about absolute control and more about maintaining broad legitimacy to avoid chain splits.
Technical Implementation Details
Voting strategies are the computational logic that determines how voting power is allocated in decentralized governance. This section details their architecture, security considerations, and implementation patterns.
A voting strategy is a smart contract that defines the rules for calculating a user's voting power for a specific proposal. It works by implementing a standard interface, typically a getVotingPower function, which is called by the governance framework when a user casts a vote. The function takes parameters like the voter's address, a block number (snapshot), and the proposal context, then returns a numerical power value. This power can be derived from token balances, NFT ownership, delegated stakes, or custom on-chain metrics. The strategy's logic is executed on-chain, ensuring the vote calculation is transparent, verifiable, and resistant to manipulation.
Frequently Asked Questions (FAQ)
Essential questions and answers for developers and DAO participants on the technical implementation, security, and mechanics of on-chain voting.
A voting strategy is the smart contract logic that determines how voting power is calculated for each participant in a decentralized autonomous organization (DAO). It defines the rules for token weighting, delegation, and eligibility. Common strategies include token-weighted voting (one token, one vote), quadratic voting (where power scales with the square root of tokens held to reduce whale dominance), and delegated voting (where users can delegate their voting power to representatives). The strategy is a critical, immutable component of a DAO's governance module, directly impacting proposal outcomes and the organization's decentralization.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.