Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Governance Hijacking

Governance hijacking is a security attack where a malicious actor acquires enough voting power in a DAO to pass proposals that drain its treasury or alter its fundamental rules.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is Governance Hijacking?

A critical vulnerability in decentralized autonomous organizations (DAOs) and on-chain governance systems.

Governance hijacking is a coordinated attack where a malicious actor acquires enough voting power—typically by purchasing or borrowing a majority of a protocol's governance tokens—to unilaterally pass proposals that drain treasury funds, alter critical parameters, or seize control of the underlying smart contracts. This attack exploits the fundamental principle of token-weighted voting, where control is proportional to token ownership rather than identity. Unlike a technical hack that exploits a code bug, this is a sybil-resistant but capital-intensive attack on the social and economic layer of a decentralized protocol.

The attack vector typically unfolds in two phases: the acquisition phase, where the attacker amasses tokens, often through market purchases or flash loans, and the proposal execution phase, where they submit and vote on a malicious proposal. A famous historical example is the attempted takeover of the Build Finance DAO in 2022, where an attacker acquired a majority of tokens and voted to transfer treasury control to themselves. Defenses against such attacks include implementing a timelock on executed proposals to allow for community reaction, using multisig guardians for critical functions, and designing vote-escrow or conviction voting models that discourage short-term speculation.

This risk highlights the paradox of decentralized governance: the very tokens that distribute control can be centralized by a well-funded adversary. It forces a trade-off between pure on-chain automation and off-chain safeguards. Consequently, many protocols adopt a progressive decentralization model, where full, token-weighted control is only enabled after the protocol achieves sufficient distribution and maturity, mitigating the risk of a low-cost takeover in its early stages.

key-features
MECHANISMS & CHARACTERISTICS

Key Features of Governance Hijacking

Governance hijacking is a systemic attack where a malicious actor acquires sufficient voting power to unilaterally pass proposals that drain or redirect a protocol's assets. These are the defining mechanisms and patterns of such attacks.

01

Token Accumulation

The foundational step where an attacker acquires enough governance tokens to control voting outcomes. This is achieved through:

  • Open market purchases of the native token.
  • Borrowing tokens via DeFi lending protocols.
  • Exploiting low voter turnout to achieve a majority with a smaller stake.
  • Using flash loans to temporarily amass voting power without capital commitment.
02

Malicious Proposal Execution

Once in control, the attacker submits and passes a proposal that appears benign but contains hidden malicious logic. Common payloads include:

  • Updating a treasury multisig to an attacker-controlled address.
  • Modifying protocol parameters (e.g., minting rights, fee destinations) to siphon value.
  • Adding a malicious plugin or adapter that grants backdoor access to funds.
  • Draining a community treasury or liquidity pool via a seemingly legitimate transfer.
03

Time-Based Attacks

Hijackers exploit the fixed timelocks and voting periods inherent to governance systems.

  • Proposal Timelock: A delay between a vote passing and execution, intended as a safety mechanism. Attackers must maintain their position throughout this period.
  • Voting Period: The window for token holders to vote. Attackers may execute a flash loan attack within this period to vote and return funds before the loan is repaid.
  • Defense Evasion: Attackers schedule execution when monitoring is low or use social engineering to reduce scrutiny.
04

Related Concept: Proposal Fatigue

A social engineering precursor to hijacking, where an attacker spams the governance forum with numerous complex or trivial proposals. This causes:

  • Voter apathy and decreased participation from legitimate token holders.
  • Obfuscation of the one malicious proposal hidden among the spam.
  • Reduced scrutiny as community members become desensitized to governance alerts. This lowers the token threshold required for a successful hijack.
05

Related Concept: Whale Manipulation

A hijacking strategy that targets or colludes with large token holders (whales) rather than outright token accumulation.

  • Bribery or Collusion: Offering side payments to whales to vote a certain way.
  • Sybil Attacks on Delegation: Creating many fake identities to attract delegated votes from users who auto-delegate to large delegates.
  • Governance Mining: Incentivizing users to delegate voting power to a malicious address in exchange for rewards.
06

Defensive Countermeasures

Protocols implement various mechanisms to mitigate hijacking risk:

  • Multisig Guardians: A fallback committee with veto power over malicious proposals.
  • High Proposal Quorums: Requiring a large percentage of total tokens to vote for a proposal to pass.
  • Progressive Decentralization: Slowly increasing governance power as the protocol matures and token distribution widens.
  • Time-locked Escrow: Holding acquired governance tokens in a vesting contract to prevent sudden accumulation.
  • Separation of Powers: Dividing control over treasury, parameters, and upgrades into different modules.
how-it-works
MECHANISM

How Governance Hijacking Works

An explanation of the technical and social processes by which a decentralized protocol's governance system is subverted.

Governance hijacking is the adversarial acquisition of sufficient voting power—typically through the accumulation of a protocol's native governance token—to unilaterally pass malicious proposals that alter the protocol's core parameters or treasury. This attack vector exploits the fundamental design of token-weighted voting in many Decentralized Autonomous Organizations (DAOs), where control is proportional to token ownership. The attacker's goal is not to improve the protocol but to extract value, often by draining the treasury, minting unlimited tokens, or altering fee structures to their benefit.

The process typically involves two phases: accumulation and execution. In the accumulation phase, an attacker covertly acquires a large stake in governance tokens, often through market purchases or borrowing via decentralized finance (DeFi) lending protocols to avoid price slippage. Once a controlling stake is secured—which may be a simple majority or a higher threshold defined by the DAO's governance parameters—the execution phase begins. The attacker submits and votes on a proposal that appears benign or technical but contains code that, when executed, grants them control over the protocol's assets or critical functions.

Several factors enable these attacks, including low voter turnout, which reduces the number of tokens needed for a majority, and the complexity of proposal code, which can obscure malicious intent. A famous historical example is the attempted takeover of the Build Finance DAO in 2022, where an attacker acquired a majority of tokens and passed a proposal to mint new tokens and drain the treasury. Defenses against hijacking include a timelock on executed proposals, a multisig guardian with veto power, and vote delegation to trusted, knowledgeable parties to increase participation and vigilance.

attack-vectors
GOVERNANCE HIJACKING

Common Attack Vectors & Methods

Governance hijacking is a class of attack where an adversary acquires enough voting power to maliciously control a decentralized autonomous organization (DAO) or protocol's governance system.

01

Core Mechanism: Vote Acquisition

Attackers accumulate governance tokens through methods like flash loan borrowing, purchasing on the open market, or exploiting token distribution flaws. The goal is to reach a quorum or majority threshold to pass malicious proposals. This is distinct from a 51% attack on a blockchain's consensus, as it targets the application layer's decision-making process.

02

The Proposal & Execution Phase

Once in control, attackers submit and vote on proposals that appear benign but contain hidden malicious logic. Common objectives include:

  • Draining the treasury by transferring funds to an attacker-controlled address.
  • Altering protocol parameters (e.g., lowering collateral ratios, minting unlimited tokens).
  • Rug pulling by upgrading a contract to a malicious version.
  • Self-dealing by awarding grants or fees to the attacker.
03

Key Vulnerability: Low Voter Participation

This is the primary enabler. Most token holders do not vote (voter apathy), drastically lowering the practical threshold for an attack. An attacker may only need to acquire a small percentage of the total supply (e.g., 5-10%) to control the active voting pool. High proposal complexity and gas costs for voting further reduce participation.

04

Real-World Example: Beanstalk Farms

In April 2022, Beanstalk, a stablecoin protocol, lost $182 million in a governance attack. The attacker used a flash loan to borrow enough governance tokens (BEAN) to pass a malicious proposal in a single transaction. The proposal contained code that instantly transferred all protocol funds to the attacker's wallet, demonstrating the risk of instant-execution governance.

05

Defensive Mechanisms & Mitigations

Protocols implement various guards against hijacking:

  • Time locks (Timelocks): Enforce a mandatory delay between a proposal's passage and its execution, allowing the community to react.
  • Multisig Guardians/Emergency DAOs: A trusted, smaller group with the power to veto or pause malicious proposals.
  • Quorum & Supermajority Requirements: Setting high thresholds for sensitive actions.
  • Sybil-resistant voting: Using conviction voting or proof-of-personhood systems to reduce the impact of token accumulation.
06

Related Concept: Governance Tokenomics

The design of the token distribution and voting system is critical for security. Flaws include:

  • Concentrated Supply: Early investors or team members holding too much voting power (whale risk).
  • Liquid vs. Locked Voting: Whether tokens used for liquidity provisioning (e.g., in an AMM LP) can also be used to vote, creating attack vectors.
  • Vote Delegation: Centralizes power with delegates, creating single points of failure if compromised.
real-world-examples
GOVERNANCE HIJACKING

Real-World Examples & Case Studies

These case studies illustrate how governance attacks have been executed, highlighting the critical vulnerabilities in decentralized governance models.

04

Curve Finance's Emergency DAO

Following the July 2023 exploit of multiple Curve Finance pools, the protocol's founder invoked an emergency DAO feature. This special governance mechanism, encoded in the Curve DAO smart contracts, allowed for the immediate execution of a critical security patch without waiting for the standard multi-day voting period. This case is a counter-example, showing how well-designed governance can include emergency safeguards and circuit breakers to respond to crises that a hijacker might exploit.

05

Vulnerability: The 51% Attack Vector

The most direct form of hijacking is a 51% attack on governance, where an entity acquires majority voting power. Risks include:

  • Token Accumulation: Buying or borrowing tokens on the open market.
  • Vote Buying: Incentivizing token holders to delegate votes maliciously.
  • Sybil Attacks: Creating many addresses to influence token-weighted votes. Mitigations include conviction voting, time-locked execution, and multisig guardians for critical functions.
06

Related Concept: Proposal Spam

Governance hijacking can also occur through proposal spam or governance fatigue. An attacker may flood the governance forum with complex, confusing, or malicious proposals to:

  • Dilute attention from a critical malicious proposal.
  • Exploit low voter turnout to pass harmful changes.
  • Waste community resources on vetting spam. This is a denial-of-service (DoS) attack on the governance process itself, often requiring proposal submission deposits and minimum vote thresholds as defenses.
security-considerations
GOVERNANCE HIJACKING

Security Considerations & Mitigations

Governance hijacking is a security risk where a malicious actor gains sufficient voting power to control a decentralized autonomous organization (DAO) or protocol's governance, enabling them to pass proposals that drain funds or alter rules for personal gain.

01

The 51% Attack

The most direct form of hijacking, where an attacker acquires a simple majority (over 50%) of the voting tokens. This allows them to pass any proposal, including malicious treasury transfers or changes to the protocol's core logic. This is a primary risk for protocols with low token distribution or where voting power is concentrated in liquid markets.

02

Vote Buying & Bribery

An attacker may not own the tokens but can bribe existing token holders to delegate votes or vote a specific way. This is often facilitated through bribe markets (e.g., platforms like Hidden Hand) where users are paid to direct their voting power. This attack vector exploits voter apathy and the financial incentives of large token holders.

03

Proposal Spam & Fatigue

A subtler attack that aims to exhaust the governance process. An attacker submits numerous complex or confusing proposals to overwhelm voters, hoping a malicious proposal slips through during voter fatigue. This tactic relies on the high cognitive and gas cost burden placed on legitimate token holders to review every proposal.

04

Key Mitigations: Timelocks & Multisigs

A timelock is a mandatory delay between a proposal's approval and its execution. This creates a "cooling-off" period (e.g., 2-7 days) for the community to identify malicious actions and organize a response, such as a hard fork or emergency shutdown. A multisig controlled by trusted community members can serve as a final backstop to veto executed malicious transactions.

05

Key Mitigations: Delegation & Quorums

Delegation allows token holders to assign their voting power to experts, improving proposal review quality and resilience against apathy. A quorum is a minimum threshold of total voting power that must participate for a vote to be valid, preventing a small, motivated attacker from passing proposals in a low-turnout scenario.

06

Real-World Example: Beanstalk

In April 2022, the Beanstalk stablecoin protocol suffered a $182 million governance attack. An attacker used a flash loan to temporarily borrow enough tokens to pass a malicious proposal, which immediately drained the protocol's treasury. The attack exploited the lack of a timelock on governance execution, allowing the proposal to pass and execute in a single transaction.

ATTACK VECTORS

Governance Hijacking vs. Related Attacks

A comparison of governance hijacking with other common on-chain attacks, highlighting their distinct mechanisms, targets, and impacts.

Attack VectorGovernance HijackingFlash Loan AttackOracle Manipulation51% Attack

Primary Target

Governance contracts and treasury

Liquidity pools (DeFi)

Price feed inputs

Blockchain consensus

Core Mechanism

Voting power accumulation

Atomic, uncollateralized loan

Feeding false price data

Hashing power majority

Typical Cost

High (token acquisition)

Low (gas fees only)

Medium (pool manipulation)

Extremely High (hardware/energy)

Attack Duration

Days to weeks

< 1 block

Minutes to hours

Sustained period

Steals Assets?

Alters Protocol Rules?

Layer of Operation

Application (Smart Contract)

Application (Smart Contract)

Application (Oracle)

Consensus (Layer 1)

Key Mitigation

Time-locks, veto powers, delegation safeguards

Transaction mempool monitoring, circuit breakers

Decentralized oracle networks, time-weighted prices

Increased network hashrate, checkpointing

GOVERNANCE

Common Misconceptions

Governance hijacking is a critical risk in decentralized systems, often misunderstood as a simple majority attack. This section clarifies the mechanisms, real-world examples, and the nuanced differences between theoretical and practical attacks on on-chain governance.

Governance hijacking is a coordinated attack where a malicious actor acquires enough voting power—typically through token accumulation or vote manipulation—to pass proposals that drain a protocol's treasury or alter its core parameters for personal gain. It works by exploiting the on-chain governance mechanisms of a Decentralized Autonomous Organization (DAO). The attacker first acquires a controlling stake in the governance token, either by purchasing it on the open market, borrowing it (via a flash loan or otherwise), or forming a coalition (a "governance cartel"). Once in control, they submit and vote for a malicious proposal, such as one that grants them the treasury's assets or changes a critical contract address to one they control. The attack is successful if the proposal passes the required quorum and vote threshold, after which the attacker can execute the malicious code.

GOVERNANCE HIJACKING

Frequently Asked Questions (FAQ)

Governance hijacking is a critical attack vector in decentralized systems where malicious actors subvert the decision-making process. This FAQ addresses the mechanics, real-world examples, and defensive strategies for this complex threat.

Governance hijacking is a malicious takeover of a decentralized autonomous organization (DAO) or protocol's governance system, where an attacker acquires enough voting power to pass proposals that drain treasury funds, alter critical parameters, or otherwise harm the protocol. This is typically achieved by accumulating a majority of governance tokens, either through market purchases, exploiting lending protocols, or leveraging flash loans. The attacker's goal is to pass a self-serving proposal, such as one that grants them control over the treasury, before the community can react. This attack exploits the core principle of token-weighted voting, where control is proportional to token ownership, not identity.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team