Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Proposal Spam

Proposal spam is the malicious or negligent submission of low-quality, duplicate, or irrelevant governance proposals to disrupt a DAO's decision-making process.
Chainscore © 2026
definition
GOVERNANCE ATTACK

What is Proposal Spam?

A malicious tactic that floods a decentralized governance system with low-quality or duplicate proposals to disrupt its operation.

Proposal spam is a form of governance attack where a malicious actor floods a decentralized autonomous organization (DAO) or blockchain network with a high volume of low-quality, duplicate, or nonsensical governance proposals. The primary goal is to disrupt the governance process by overwhelming participants, making it difficult to find and vote on legitimate proposals, and exhausting the community's attention and resources. This attack exploits the permissionless or low-cost nature of submitting proposals on many platforms.

The mechanics of proposal spam often involve creating numerous proposals with trivial content or copying existing ones. This floods the proposal queue or forum, causing voter fatigue and governance paralysis. Key vulnerabilities exploited include low or zero proposal submission fees, lack of effective spam filters, and sybil-resistant identity systems. The attack can be a prelude to a more serious exploit, as a distracted community may fail to notice a malicious proposal hidden within the spam.

Common consequences include increased transaction costs for the DAO treasury (if fees are paid to the protocol), reduced voter participation due to frustration, and delayed execution of critical protocol upgrades or treasury allocations. In severe cases, it can render a governance system temporarily unusable, undermining the core decentralized decision-making principle. This highlights the tension between permissionless participation and operational security in on-chain governance.

Protocols implement several anti-spam mechanisms to mitigate this risk. These include: - Proposal submission deposits that are forfeited if the proposal fails. - Minimum token thresholds for creating proposals. - Delegated submission through elected stewards or committees. - Pre-proposal discussion forums where ideas are vetted before an on-chain vote. - Time-based cooldowns between submissions from the same address. The design of these mechanisms is crucial to balance accessibility with resilience.

A historical example is the attempted spam attack on the Compound Finance governance system in 2021, where an attacker submitted hundreds of duplicate proposals. Because Compound required a minimum of 65,000 COMP tokens to propose, the attacker borrowed funds to meet the threshold, submitted the spam, and then repaid the loan. This incident demonstrated that even systems with significant economic barriers are not immune to sophisticated spam tactics that utilize flash loans or other DeFi primitives.

Analyzing proposal spam is essential for governance security. It represents a low-cost, high-impact attack vector that tests the procedural integrity of a DAO. Robust defense requires a layered approach combining economic disincentives, social coordination layers (like forums), and technical filters. As governance controls more valuable assets, the incentive for such disruptive attacks increases, making spam resistance a critical component of sustainable decentralized governance design.

how-it-works
GOVERNANCE ATTACK

How Proposal Spam Works

Proposal spam is a governance attack vector where malicious actors flood a decentralized autonomous organization (DAO) with low-quality or malicious proposals to disrupt operations and exploit systemic weaknesses.

Proposal spam, also known as governance spam, functions by exploiting the inherent cost and process structures of on-chain governance. An attacker submits a high volume of proposals—often nonsensical, duplicate, or designed to create confusion—to overwhelm the community's ability to review and vote effectively. The primary mechanisms enabling this attack are low or non-existent proposal submission costs and a lack of effective pre-screening mechanisms like a proposal threshold or a timelock before voting begins. This floods the governance interface, creating voter fatigue and obscuring legitimate proposals.

The attacker's goals are typically multifaceted: to dilute voter attention, making it harder for good proposals to pass; to test governance resilience for future exploits; or to profit directly by including malicious code within the spam, hoping it passes during the chaos. For example, a spam proposal might request a trivial treasury spend or a minor parameter change, but buried in its calldata could be a function that grants the attacker special privileges or drains funds. This tactic relies on voter apathy or automated voting systems that may not scrutinize every proposal's details.

The technical execution often involves automated scripts or bots to submit proposals rapidly, leveraging the low gas costs on the underlying blockchain. The spam creates a denial-of-service (DoS) condition for the governance process. Legitimate delegates and token holders must then spend disproportionate time and resources to analyze each proposal, a process known as governance overhead. If the system uses a snapshot of token holdings at a specific block for voting, spam can also be timed to target periods of low community engagement.

Mitigation strategies are critical for DAO security. Common defenses include implementing a meaningful proposal deposit (slashed if the proposal fails), establishing a proposal threshold (a minimum token balance required to submit), and introducing a forum signaling or temperature check phase off-chain before any on-chain proposal is made. More advanced systems use delegate curation, where trusted delegates pre-vet proposals, or futarchy, which uses prediction markets to assess proposal outcomes. The constant evolution of proposal spam necessitates that governance frameworks be designed with spam resistance as a first-principle consideration.

key-features
IDENTIFICATION

Key Characteristics of Proposal Spam

Proposal spam in decentralized governance is characterized by several distinct patterns that distinguish it from legitimate governance activity. Recognizing these traits is essential for maintaining functional and efficient DAO operations.

01

Low-Quality or Vague Content

Spam proposals often lack substantive detail, technical specifications, or a clear ask. They may be characterized by:

  • Ambiguous language with no concrete implementation plan.
  • Copy-pasted templates or generic text with minimal customization.
  • Missing critical components like budget breakdowns, timelines, or success metrics.
  • Example: A proposal titled "Marketing Boost" with only a single sentence: "We should do more marketing."
02

Sybil Attacks & Vote Farming

This involves creating a large number of fake or low-stake identities to manipulate proposal visibility and outcomes.

  • Sybil identities are used to meet proposal submission thresholds or create artificial discussion.
  • Vote farming leverages airdropped or borrowed governance tokens to create the illusion of community support.
  • The goal is often to dilute signal from legitimate proposals or to push through malicious changes under the cover of noise.
03

Financial Extraction Attempts

A primary motive is the direct or indirect extraction of treasury funds with little to no promised value in return.

  • Proposals for excessive grants or salaries with no clear deliverables or oversight.
  • "Tip jar" proposals that request funds for vague past contributions.
  • Proposals that funnel funds to newly created or obscure entities controlled by the submitter.
  • These often rely on voter apathy or fatigue to pass.
04

Disruption of Governance Process

Spam is designed to overload and degrade the governance system itself.

  • Flooding the forum and snapshot with proposals to drown out legitimate discourse.
  • Exploiting proposal thresholds to force votes on trivial or nonsensical matters, causing voter fatigue.
  • Wasting contributor time as community members must review, discuss, and vote on low-signal content.
  • This can paralyze a DAO's decision-making capacity.
05

Common Technical Vectors

Spammers use specific on-chain and off-chain methods to execute their campaigns.

  • On-chain: Spamming the blockchain with proposal creation transactions to increase gas costs for others.
  • Off-chain: Automating forum post creation using bots to simulate discussion.
  • Governance Mining: Repeatedly submitting similar proposals to farm any potential participation rewards.
  • Cross-DAO Spam: The same individual or group targets multiple DAOs with identical, low-effort proposals.
06

Mitigation Strategies

DAOs employ various mechanisms to filter out spam and protect governance integrity.

  • Proposal Deposits: Requiring a bond (in native tokens) to submit, which is forfeited if the proposal fails.
  • Reputation Gates: Using proof-of-personhood systems or social graph analysis to limit submissions.
  • Delegated Moderation: Empowering a council or sub-DAO to curate and filter proposals before a full vote.
  • Staked Voting: Implementing conviction voting or time-locked votes to increase the cost of spam.
motivations-and-goals
PROPOSAL SPAM

Motivations and Attack Goals

Proposal spam is a governance attack where an adversary floods a DAO's voting system with low-quality or malicious proposals to disrupt operations and achieve specific goals.

01

Disruption and Paralysis

The primary goal is to overwhelm the governance process, causing voter fatigue and making it impossible for legitimate proposals to receive adequate attention or quorum. This can paralyze a DAO, preventing protocol upgrades, treasury management, or critical parameter changes.

  • Tactics: Submitting many proposals with trivial or nonsensical content.
  • Impact: Legitimate governance is drowned out, halting progress.
02

Financial Extraction

Attackers may use spam to pass malicious proposals disguised as legitimate ones. By flooding the system, they reduce scrutiny, increasing the chance a harmful proposal slips through. The goal is direct financial gain.

  • Common Vectors: Proposals to drain the treasury, mint excessive tokens, or change fee parameters to benefit the attacker.
  • Example: The 2022 Beanstalk Farms exploit involved a malicious governance proposal that passed during a flash loan attack, resulting in a $182M loss.
03

Cost Inflation and Griefing

This attack aims to impose excessive costs on other participants. In systems where submitting or voting on proposals requires gas fees or locked capital, spam forces legitimate voters to spend significant resources to defend the status quo.

  • Mechanism: Forces token holders to pay repeatedly to vote 'No' on spam.
  • Goal: Griefing—imposing costs without direct profit—or depleting a competitor's war chest.
04

Reputation Damage and Chaos

Spam can be used to damage the reputation of a protocol by creating a public perception of dysfunction and chaos. This can erode community trust, drive away developers, and negatively impact the token price.

  • Tactic: Creating proposals that are offensive, divisive, or highlight protocol vulnerabilities.
  • Secondary Effect: Creates information asymmetry, where savvy attackers can exploit the confusion for other gains.
05

Sybil Attack Vector

Proposal spam is often executed via Sybil attacks, where an attacker creates many fake identities (Sybils) to meet proposal submission thresholds or simulate grassroots support. This bypasses token-weighted defenses.

  • Prerequisite: Governance models with low-cost or 1-token-1-vote submission requirements are vulnerable.
  • Combination: Sybil spam can be used to trigger snapshot voting on many fronts simultaneously.
06

Related Concepts

Understanding proposal spam requires knowledge of adjacent governance mechanisms and attacks.

  • Governance Capture: The long-term goal of acquiring enough voting power to control decisions, of which spam can be a tactic.
  • Vote Sniping: Last-minute voting manipulation that spam can obscure.
  • Quorum: The minimum participation threshold spam aims to make unattainable.
  • Bonding Curves: A common anti-spam measure requiring a financial deposit to submit a proposal.
real-world-examples
PROPOSAL SPAM

Real-World Examples and Case Studies

Examining historical incidents of proposal spam reveals the tactics used, their impact on governance, and the defensive mechanisms developed in response.

01

The Compound Finance "Troll" Proposal

In 2021, a user submitted a proposal to Compound's governance forum titled "Troll," which contained no substantive content. This was a deliberate test of the proposal submission cost mechanism. The incident highlighted how a low-cost submission process could be exploited to flood the forum with nonsense, forcing the community to waste time filtering noise. It underscored the need for minimum proposal thresholds or deposit requirements to ensure serious submissions.

02

Uniswap's Temperature Check Spam

Uniswap's Snapshot-based temperature check stage has been targeted by spam proposals aiming to manipulate sentiment or test governance participation. Attackers create multiple low-effort proposals with similar titles to confuse voters and dilute attention from legitimate initiatives. This demonstrates how off-chain voting platforms without significant economic costs are particularly vulnerable to sybil attacks and spam, necessitating reputation systems or delegated voting to maintain signal quality.

03

The MakerDAO "Governance Attack" Simulation

A 2022 simulation by security researchers outlined a governance attack vector where an attacker could spam the voting portal with a high volume of proposals during a critical moment. The goal was to obfuscate a malicious proposal among the spam, hoping it would pass unnoticed due to voter fatigue. This case study is a classic example of using spam as a smokescreen, leading to the implementation of timelocks and mandatory executive vote delays to provide a review period.

04

Curve Finance & veTokenomics as a Defense

Curve's veToken model (vote-escrowed tokens) inherently combats proposal spam by requiring users to lock their CRV tokens for long periods to gain voting power. This creates a high economic cost for attempting to spam the governance system, as an attacker's capital is immobilized. The system ensures that proposal creators and voters have skin in the game, making frivolous or malicious proposals economically irrational. This is a prime example of cryptoeconomic design solving the spam problem.

05

Aragon's Proposal Deposit Framework

The Aragon client implements a formal proposal deposit system, where submitting a governance action requires staking a configurable amount of the native token. This deposit is slashed if the proposal fails to meet a minimum participation or approval threshold. This mechanism directly attaches a financial disincentive to spam, ensuring that only proposals with anticipated community support are submitted. It represents a clear, on-chain solution to the proposal spam problem.

defense-mechanisms
PROPOSAL SPAM

Common Defense Mechanisms

Proposal spam is a governance attack where malicious actors flood a DAO with low-quality or malicious proposals to disrupt operations, waste community attention, and potentially pass harmful measures. These defenses are critical for maintaining functional on-chain governance.

02

Voting Quorums & Thresholds

Minimum participation requirements a proposal must meet to be considered valid and executable. These create a high bar for spam proposals to clear.

  • Quorum: The minimum percentage of the total voting power that must participate in a vote for the result to be valid (e.g., 4% of all tokens).
  • Approval Threshold: The minimum percentage of 'Yes' votes required for passage (e.g., 51% for a simple majority, 67% for a supermajority). Spam proposals typically fail to attract meaningful participation, causing them to fail quorum.
03

Proposal Threshold

A minimum token ownership requirement to submit a proposal. This restricts proposal creation to stakeholders with significant skin in the game, as they are economically aligned with the protocol's success. For instance, a DAO may require a proposer to hold 0.5% of the governance token supply. This prevents Sybil attackers from creating infinite spam proposals without first acquiring a costly stake.

05

Delegation & Representative Voting

A system where token holders delegate their voting power to trusted experts or delegates. This concentrates voting power into fewer, more attentive hands, making it harder for spam to go unnoticed. Delegates, who often have reputational capital at stake, are incentivized to filter out noise and vote seriously. This reduces voter fatigue and increases the quality of governance participation.

06

Pre-Proposal Forums & Temperature Checks

An off-chain, informal discussion phase required before an on-chain proposal can be submitted. Proposers must first post their idea on a forum (like Discourse or Commonwealth) to gather community sentiment via polls and feedback. This social consensus layer filters out clearly unpopular or spammy ideas before they consume on-chain gas and formal voting attention. Many DAOs enforce this as a mandatory step in their governance process.

GOVERNANCE

Proposal Spam vs. Legitimate Proposal

Key characteristics distinguishing malicious or low-quality governance proposals from valid, constructive ones.

FeatureProposal SpamLegitimate Proposal

Primary Intent

Disrupt governance or extract value

Improve protocol or community

Economic Rationale

None or purely extractive

Clear, net-positive value proposition

Technical Detail

Vague, copy-pasted, or absent

Specific, with clear implementation path

Voter Engagement

Relies on apathy or confusion

Seeks informed discussion and debate

On-Chain Impact

Clogs mempool, wastes gas

Targeted, efficient state change

Funding Request

Disproportionate to scope

Justified and often milestone-based

Community Sentiment

Overwhelmingly negative

Constructive discussion, mixed support

PROPOSAL SPAM

Frequently Asked Questions (FAQ)

Proposal spam is a governance attack vector where malicious actors flood a DAO with low-quality or malicious proposals to disrupt operations. This section answers common questions about its mechanics, impacts, and defenses.

Proposal spam is a governance attack where an actor submits a high volume of low-quality, frivolous, or malicious proposals to a Decentralized Autonomous Organization (DAO) with the intent to disrupt its operations. The primary goal is to create governance fatigue, overwhelming token holders and core contributors with the cognitive load and gas costs of reviewing and voting, thereby paralyzing the decision-making process. Attackers may also use spam to bury a legitimate, critical proposal in a sea of noise, ensuring it doesn't get the attention or quorum required to pass. This tactic exploits the permissionless or low-barrier nature of proposal submission in many DAO frameworks.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team