Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Surround Vote

A surround vote is a Byzantine fault in Tendermint-based proof-of-stake consensus where a validator's votes improperly surround another validator's votes on conflicting block heights, leading to slashing.
Chainscore © 2026
definition
BLOCKCHAIN GOVERNANCE

What is a Surround Vote?

A surround vote is a specific strategy in token-based governance where a voter manipulates their voting power to influence the outcome of a proposal by strategically depositing and withdrawing tokens from a staking contract.

In a surround vote, a voter with a large token balance exploits the snapshot mechanism of a governance system. The attacker first votes on a proposal with a small amount of tokens. Then, they deposit a much larger amount of tokens into the staking contract (e.g., a veToken model) after the snapshot for that proposal is taken but before voting ends. This large deposit gives them significant voting power on subsequent proposals, allowing them to "surround" and outvote the original, smaller vote. The strategy hinges on the fact that voting power is often calculated from a snapshot taken at the proposal's creation, not at the time of the vote.

The primary goal of a surround vote is to dilute the voting power of other participants on a target proposal without directly changing one's own vote on it. By dramatically increasing their overall voting power in the system, the attacker makes the voting power of the initial, opposed vote proportionally insignificant. This can be used to ensure a rival proposal fails or to protect a proposal the attacker favors from being overturned. It is considered a form of governance attack or vote manipulation that undermines the principle of one-token-one-vote fairness at a specific point in time.

A classic example involves the Curve Finance DAO and its veCRV (vote-escrowed CRV) system. An attacker could vote against a gauge weight proposal with a small stake. They then lock a massive amount of CRV to obtain veCRV, which grants them enormous voting power for all future gauge weight votes. This new power allows them to outvote the initial decision on the next voting cycle, effectively nullifying the community's earlier outcome. The surround vote exploits the time delay between snapshot and execution inherent in many DeFi governance systems.

To mitigate surround voting, protocols implement defensive mechanisms. These include a vote-locking period that prevents newly deposited tokens from being used for voting immediately, and adaptive quorum calculations that consider changing token supplies. Some systems move towards continuous voting or time-weighted voting power models, where influence is based on a historical average of holdings rather than a single snapshot. Understanding this attack vector is crucial for designing robust, sybil-resistant decentralized autonomous organization (DAO) governance.

how-it-works
GOVERNANCE MECHANISM

How Does a Surround Vote Work?

A surround vote is a sophisticated governance strategy in decentralized autonomous organizations (DAOs) that allows a voter to influence the outcome of a proposal by strategically placing their votes both for and against it.

A surround vote is a governance tactic where a voter, typically a large token holder or "whale," places a portion of their voting power in support of an existing proposal and a larger portion in support of a new, competing proposal they create. The goal is to "surround" the original proposal, making it impossible to pass without also passing the voter's preferred alternative. This is achieved by exploiting the vote-quorum and majority-threshold mechanics of platforms like Snapshot, where only the winning option's votes are counted toward the quorum.

The mechanism works because most governance systems tally votes per option, not per voter. A voter can split their voting power (e.g., their token balance) across multiple choices. By creating a new proposal with similar goals but different parameters (like a modified treasury allocation or a different smart contract address), the actor votes a small amount for the original and a large amount for their new version. If the original proposal reaches a quorum and a simple majority, the surrounding voter's small for vote helps it pass. However, their larger vote for the competing proposal often ensures it receives more total support, making it the winning choice.

This strategy is controversial as it can subvert the intent of decentralized governance. It allows a well-resourced actor to hijack the proposal process, creating a vote-splitting scenario where the community's will is distorted. Defenders argue it is a legitimate expression of preference within the rules. In response, many DAOs have implemented defenses such as vote locking (preventing tokens from being used on multiple proposals), timing restrictions between proposals, or more nuanced voting systems like quadratic voting or conviction voting to reduce the impact of concentrated capital.

key-features
CONSENSUS MECHANISM

Key Features of a Surround Vote

A Surround Vote is a mechanism in Tendermint-based Proof-of-Stake blockchains where a validator attempts to override a canonical chain by voting on a conflicting block at the same height, but from a different round. It is a specific type of Byzantine fault that undermines consensus safety.

01

Definition & Core Fault

A Surround Vote occurs when a validator casts a pre-vote for a block in a later consensus round that 'surrounds' a previously justified block from an earlier round. Formally, a vote with round r2 and height h surrounds a vote with round r1 and height h if r1 < r2. This violates the Voting Rule that validators must follow the highest locked round, creating a safety fault.

02

Impact on Consensus Safety

This fault directly threatens the safety property of the blockchain, which states that two honest nodes will never finalize conflicting blocks. By voting on conflicting blocks at the same height, a malicious validator can cause the network to potentially finalize two different chains, leading to a fork. Tendermint's slashing conditions are designed to detect and punish this behavior to preserve safety.

03

Slashing Condition

Surround Votes are a slashable offense. The protocol's evidence module detects when a validator has signed two conflicting votes (h, r1) and (h, r2) where one surrounds the other. Upon detection, the validator's staked tokens (their bond) are partially or fully slashed (burned), and they may be jailed (removed from the active validator set). This provides a strong economic disincentive against this attack.

04

Distinction from Equivocation

It is crucial to distinguish a Surround Vote from Equivocation (a Double Sign).

  • Equivocation: Voting for two different blocks at the same height and round (h, r).
  • Surround Vote: Voting for two different blocks at the same height but in different rounds (h, r1) and (h, r2), where one round surrounds the other. Both are Byzantine faults but represent different violations of the consensus rules.
05

Prevention & Detection

Prevention is enforced through validator client logic, which must correctly track the Locked Round and never sign a vote that violates the protocol's voting rules. Detection is performed by network nodes who collect and gossip evidence of faulty votes. This evidence is bundled into a transaction and submitted to the chain, where the slashing module verifies and executes the penalty, making the system accountably safe.

06

Example in Tendermint/Cosmos SDK

In the Cosmos SDK, the x/slashing module handles evidence of Byzantine behavior, including Surround Votes. If Validator A pre-votes for block B1 at height 100, round 1, and later pre-votes for a conflicting block B2 at height 100, round 3, it has committed a Surround Vote (round 3 surrounds round 1). A relayer can submit a MsgSubmitEvidence message containing the proof, leading to automatic slashing.

visual-explainer
DEFINITION

Visualizing a Surround Vote

A surround vote is a sophisticated governance attack in decentralized protocols where a malicious actor manipulates voting outcomes by strategically distributing their token holdings.

A surround vote is a governance attack vector in decentralized autonomous organizations (DAOs) where a malicious actor, or cartel, manipulates an on-chain vote by strategically distributing their token holdings. The attacker places a large vote against a proposal they wish to defeat, then uses separate wallets to place smaller votes for the proposal both before and after their large opposing vote. This "surrounds" the honest votes in favor, diluting their voting power within the chosen snapshot mechanism. The attack exploits the specific vote-counting logic of certain snapshot-based governance systems, particularly those using a relative majority or quorum system, rather than a simple token-weighted tally.

The mechanics rely on the time-dependent nature of the vote. In systems like Compound's and Uniswap's early governance, a voter's voting power is determined by their token balance at the exact block number of the proposal's creation. The attacker first casts a large, honest-looking vote against a proposal. Then, using tokens acquired or delegated after that snapshot block, they create new wallet addresses to cast smaller votes in favor. Because these new votes are cast with tokens not locked at the snapshot, they are often weighted less or counted separately, but their strategic placement manipulates the apparent margin and can invalidate honest votes sandwiched between them. This creates a false narrative of support while ensuring the attacker's original, heavily-weighted opposing vote dictates the outcome.

Visualizing this attack reveals its deceptive nature. On a voting timeline, honest "For" votes appear as a cluster. The attacker's large "Against" vote is a dominant negative block. The fraudulent "For" votes from the attacker are then placed on both sides of the honest cluster, appearing to "surround" it. This visualization highlights how the protocol's vote aggregation logic is tricked into reading the sequence as a coherent shift in sentiment, rather than a single entity gaming the system. The result is that the genuine voter support is effectively nullified or diluted within the calculated margins, leading to the proposal's failure despite potentially having legitimate majority support.

Mitigating surround votes requires protocol upgrades. The most common solution is the implementation of a vote checkpoint or token delegation snapshot. This mechanism freezes token balances and delegations at a specific block before the voting period begins, preventing attackers from using newly acquired tokens to create surrounding votes. Compound famously patched this vulnerability by introducing Governor Bravo, which records voting power at the proposal submission block. Other defenses include moving to simpler, non-time-weighted vote counting or implementing sybil-resistance mechanisms to detect and cluster votes from likely related addresses, though the snapshot fix remains the most direct and widely adopted technical solution.

security-considerations
SURROUND VOTE

Security Considerations & Rationale

The Surround Vote is a core governance mechanism in the Optimism ecosystem. This section details the security principles and design rationale behind its implementation.

01

Sybil Resistance via Token Weighting

The primary security model relies on token-weighted voting using OP tokens. This directly ties voting power to economic stake in the network, making large-scale Sybil attacks—where an attacker creates many fake identities—prohibitively expensive. The cost to acquire enough tokens to manipulate a vote must outweigh the potential benefit, creating a strong economic disincentive.

02

Defense Against Proposal Spam

To prevent governance spam and ensure proposal quality, the system imposes a proposal submission deposit. This deposit is only refunded if the proposal passes a preliminary temperature check, creating a financial cost for submitting low-quality or malicious proposals. This mechanism filters noise and ensures only serious, community-vetted initiatives reach a final vote.

03

Temporal Attack Mitigation

The voting process is structured with defined, immutable phases (Temperature Check, Vote). This prevents last-second snapshot manipulation by fixing the voting power snapshot at a specific block. Attackers cannot buy tokens after the snapshot to influence an ongoing vote. The time-bound phases also allow for community deliberation and reduce the impact of short-term volatility.

04

Quorum & Threshold Safeguards

Outcomes are protected by configurable quorum (minimum participation) and approval threshold requirements. A proposal must achieve both sufficient turnout and a supermajority of 'Yes' votes to pass. This prevents a small, highly motivated group from passing proposals without broad consensus and ensures decisions reflect the will of the engaged, staked community.

05

Rationale: Progressive Decentralization

The Surround Vote is a step in Optimism's progressive decentralization roadmap. It moves governance authority from the initial Security Council to OP token holders, distributing control. The multi-phase design (delegate signaling, Temperature Check, Vote) is intentional, allowing for gradual consensus building and reducing the risk of rash decisions by the full token holder base.

06

Limitations & Known Considerations

The system inherits the security limitations of its underlying mechanisms:

  • Voter Apathy: Low participation can undermine legitimacy.
  • Whale Dominance: Concentrated token ownership can lead to centralized decision-making.
  • Oracle Reliance: The process depends on secure blockchain oracles (like Snapshot) for off-chain vote aggregation and execution. A compromise of this infrastructure could disrupt governance.
ETHEREUM CONSENSUS LAYER

Surround Vote vs. Other Slashing Conditions

A comparison of slashing penalties for validator misbehavior in Ethereum's Proof-of-Stake protocol.

Slashing ConditionSurround VoteDouble VoteInactivity Leak

Definition

Attesting to a conflicting checkpoint history that 'surrounds' another

Publishing two different attestations for the same target epoch

Extended failure to perform validator duties during a chain split

Primary Trigger

Violation of Casper FFG's slashing rule #2

Violation of Casper FFG's slashing rule #1

Network finality stall (>4 epochs)

Intent Requirement

Can be accidental or malicious

Typically indicates malicious intent

Non-intentional (offline/partitioned)

Penalty (Minimum)

~0.5-2 ETH + correlation penalty

~1 ETH + correlation penalty

Gradually up to 100% of stake over ~36 days

Ejection

Yes, validator is forcibly exited

Yes, validator is forcibly exited

No, validator remains active

Whistleblower Reward

Yes, up to 0.0625 ETH

Yes, up to 0.0625 ETH

No

Detection Complexity

High (requires analyzing vote history)

Low (direct comparison of two messages)

Automatic (by protocol rules)

ecosystem-usage
SURROUND VOTE

Ecosystem Usage

Surround Vote is a governance mechanism used in decentralized autonomous organizations (DAOs) to prevent voting manipulation by requiring participants to stake tokens on both sides of a proposal.

01

Core Mechanism

Unlike simple majority voting, Surround Vote requires voters to deposit collateral (often the DAO's governance token) into two opposing pools: one for 'For' and one 'Against'. This creates a financial skin in the game for understanding and accurately predicting the proposal's outcome, as the losing side's stake is slashed or redistributed.

02

Preventing Whale Domination

A primary use is to mitigate whale voting and vote buying. A large token holder cannot simply force a proposal through by voting all tokens one way. To exert maximal influence, they must risk a proportional amount of capital on the opposing side, making malicious proposals economically irrational and encouraging honest signal aggregation.

03

Incentivizing Research & Participation

The mechanism financially rewards informed voters. Participants are incentivized to research proposals thoroughly before staking, as incorrect predictions lead to loss of funds. This aims to elevate governance quality beyond mere token-weighted polling, making it a futarchy-adjacent system that bets on outcomes.

05

Key Trade-offs & Challenges

  • Capital Intensity: Requires locking funds on both sides, reducing capital efficiency.
  • Complexity: More difficult for casual participants to understand than simple voting.
  • Voter Apathy: The financial risk may discourage participation, potentially centralizing influence among a few highly engaged, wealthy voters.
06

Related Governance Concepts

Surround Vote interacts with several other advanced governance models:

  • Conviction Voting: Measures support over time, not just a snapshot.
  • Futarchy: Governs by betting on measurable outcomes.
  • Quadratic Voting: Diminishes the power of large token holdings.
  • Holographic Consensus: Uses prediction markets to surface proposals.
SURROUND VOTE

Common Misconceptions

Surround voting is a sophisticated governance mechanism in decentralized protocols, often misunderstood. This section clarifies its core mechanics, dispels common myths, and explains its strategic implications for token holders and protocol security.

No, a surround vote is a strategic voting action, not a simple tally of for/against. It is a mechanism where a voter with a large stake (e.g., a delegator) casts opposing votes on both sides of a proposal to influence its outcome. The voter first votes against a proposal to trigger a quorum or voting period, then later changes their vote to support it (or vice-versa), effectively "surrounding" the voting action of smaller participants. This exploits the time-based nature of snapshot voting and can be used to pass or defeat proposals that might otherwise fail due to low participation.

SURROUND VOTE

Technical Details

Surround Vote is a sophisticated governance mechanism designed to prevent vote manipulation by requiring voters to stake tokens both for and against a proposal. This section details its technical implementation, security properties, and operational mechanics.

A Surround Vote is a governance attack vector where a large token holder (or a coordinated group) places token-weighted votes both for and against a proposal to manipulate the outcome and extract value. The attacker first votes against a proposal they believe will pass, creating a low quorum snapshot. If the proposal is failing, they then place a larger vote for the proposal, 'surrounding' the original opposition votes. This manipulation can be used to trigger specific governance parameters or exploit time-based reward mechanisms. The defense against this is often a commit-reveal voting scheme or a mechanism that finalizes votes at specific checkpoints, preventing last-minute strategic vote switching.

SURROUND VOTE

Frequently Asked Questions

Common questions about the Surround Vote mechanism, a core component of decentralized governance systems like Optimism's Token House.

A Surround Vote is a governance mechanism designed to prevent vote manipulation by requiring voters to commit tokens for a period before and after a proposal's voting window. It works by establishing a commitment period where voters lock their tokens, followed by the active voting period, and concluding with a reveal period where votes are cast and tallied. This structure disincentivizes last-minute, manipulative voting by attackers who might try to sway the outcome after seeing the preliminary tally, as they would need to have committed their tokens well in advance.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Surround Vote - Blockchain Slashing Condition Definition | ChainScore Glossary