Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Voting Strategy

A voting strategy is the set of rules that determines how voting power is calculated in a DAO, based on token balance, lock duration, or delegation.
Chainscore © 2026
definition
DEFINITION

What is a Voting Strategy?

A voting strategy is a predefined set of rules or a smart contract that determines how voting power is calculated and allocated in a decentralized governance system, often based on token ownership, delegation, or other on-chain credentials.

In the context of Decentralized Autonomous Organizations (DAOs) and on-chain governance, a voting strategy is the computational logic that translates a user's holdings or status into quantifiable voting power. It is a core component of governance frameworks like Snapshot, OpenZeppelin Governor, and Aragon. Instead of a simple one-token-one-vote model, strategies enable complex mechanisms such as quadratic voting, delegation, time-weighted balances, or multi-token governance. The strategy is executed off-chain for gasless voting or on-chain for binding execution, calculating a voter's influence at the precise block or timestamp of a proposal's creation.

Common voting strategy types include token-weighted (power proportional to token balance), delegated (power from other users' delegated tokens), quadratic (power is the square root of tokens to reduce whale dominance), and NFT-based (power granted by owning a specific non-fungible token). Advanced strategies can combine multiple factors, such as a user's time-locked tokens (ve-tokens) or their activity within a protocol, creating sybil-resistant and aligned governance systems. These strategies are defined in a manifest or smart contract that governance platforms query to determine each address's voting weight for a specific proposal.

The choice of voting strategy directly shapes a protocol's governance security and inclusivity. A well-designed strategy balances influence among stakeholders, mitigates manipulation risks like vote buying or sybil attacks, and aligns voter incentives with the protocol's long-term health. For example, Curve Finance's veCRV model uses a time-lock strategy to grant boosted voting power to long-term token lockers, while Gitcoin Grants employs quadratic funding strategies to democratize allocation. Developers implement these strategies by deploying custom contract logic that adheres to standard interfaces, allowing governance platforms to compute voting power dynamically and transparently for every proposal.

key-features
MECHANISMS & MODELS

Key Features of Voting Strategies

Voting strategies are the rule sets that determine how voting power is allocated and aggregated within a decentralized governance system. The choice of strategy fundamentally shapes a DAO's decision-making process and security.

01

Token-Weighted Voting

The most common strategy where voting power is directly proportional to the quantity of governance tokens held. This aligns influence with economic stake but can lead to plutocracy.

  • Example: A user with 100 tokens has 100 votes.
  • Use Case: Foundational for protocols like Uniswap and Compound.
  • Trade-off: Simple to implement but susceptible to vote buying and whale dominance.
02

Quadratic Voting

A mechanism designed to reduce whale dominance by making the cost of votes increase quadratically. Voting power is the square root of the tokens committed.

  • Mechanism: 1 token = 1 vote, 4 tokens = 2 votes, 100 tokens = 10 votes.
  • Goal: To better reflect the intensity of preference among a diverse group.
  • Challenge: Requires robust sybil resistance to prevent users from splitting tokens across multiple addresses.
03

Delegated Voting

A representative model where token holders can delegate their voting power to a trusted third party or expert. This reduces voter apathy and centralizes expertise.

  • Example: Compound and Uniswap allow delegation to individuals or entities.
  • Benefit: Enables informed participation without requiring constant engagement from all holders.
  • Risk: Can lead to the formation of centralized power blocs or cartels.
04

Conviction Voting

A time-based strategy where voting power accumulates the longer a voter supports a proposal. It is designed for continuous funding decisions, not simple yes/no votes.

  • Mechanism: Votes are staked on proposals; influence grows over time but is withdrawn immediately if switched.
  • Use Case: Pioneered by 1Hive for community grant funding.
  • Advantage: Filters for proposals with sustained, organic support and allows for dynamic prioritization.
05

Multisig & Permissioned Voting

A strategy where voting power is restricted to a predefined set of addresses, typically a multi-signature wallet controlled by a council or founding team. This is common in early-stage DAOs.

  • Mechanism: Proposals execute only after a threshold (e.g., 4-of-7) of keyholders sign the transaction.
  • Phase: Often used as a starter governance model before transitioning to token-based voting.
  • Characteristic: Efficient but centralized, trading decentralization for execution speed and security.
06

Holographic Consensus

An advanced strategy that uses a prediction market to pre-filter proposals. Delegates stake tokens to "boost" proposals they believe will pass, fast-tracking them to a main vote.

  • Process: Combines futarchy elements with delegated voting.
  • Goal: Increases governance scalability by only putting high-confidence proposals to a full token vote.
  • Implementation: Used by DAOstack's Alchemy platform to manage proposal throughput.
how-it-works
GOVERNANCE MECHANICS

How a Voting Strategy Works

A voting strategy is the computational logic that determines a user's voting power in a decentralized governance system, typically by querying on-chain data to calculate token holdings or other qualifying assets.

In decentralized autonomous organizations (DAOs) and on-chain governance platforms like Snapshot, a voting strategy is not a single rule but a modular smart contract or off-chain function. Its core function is to answer a single question at a specific block number: "How much voting power does this address possess?" This calculation forms the foundation for weighted voting, where influence is proportional to a user's stake or contribution, as opposed to one-person-one-vote systems. Strategies are defined per proposal, allowing DAOs to tailor governance participation to different asset types or metrics.

Common voting strategies include the token-weighted strategy, which calculates power based on balances of a specific ERC-20 or ERC-721 token, and the multisig-owner strategy, which grants power to signers of a multisig wallet. More complex strategies can compute delegated voting power from systems like Compound or Uniswap, factor in time-locked tokens (ve-tokens), or even measure contributions in a proof-of-personhood system. The strategy fetches this data from the blockchain state at a predetermined snapshot block, ensuring a fixed and tamper-proof record of eligible voters.

The technical implementation involves a getVotingPower function that takes a voter's address, a snapshot block number, and optional parameters, then returns an integer representing their power. On Snapshot, these strategies are written in TypeScript and executed off-chain for gasless voting, while on-chain governance systems integrate them directly into smart contract logic. This modularity allows a single proposal to use multiple strategies—for example, combining native token holdings with NFT ownership—where the final voting power is the sum or another aggregate of the individual strategy outputs.

Proper strategy design is critical for governance security and fairness. A flawed strategy can lead to vote manipulation, such as token borrowing (flash-loan attacks) if the snapshot is not securely pinned, or sybil attacks if identities are not properly weighted. Therefore, strategies often incorporate mitigations like using a block number from several blocks in the past to prevent last-minute manipulation, or integrating with sybil-resistance protocols. The choice of strategy fundamentally shapes the governance constituency and the distribution of power within a protocol.

common-strategy-types
GOVERNANCE MECHANICS

Common Types of Voting Strategies

Voting strategies are the specific rules and mechanisms that determine how voting power is allocated and aggregated in on-chain governance systems.

01

Token-Weighted Voting

The most common strategy where voting power is directly proportional to the number of governance tokens held. This creates a one-token, one-vote system. It's simple to implement but can lead to plutocracy, where large token holders (whales) have disproportionate influence. Examples include early Compound and Uniswap governance.

02

Quadratic Voting

A mechanism designed to reduce the power of large stakeholders. A voter's influence scales with the square root of the tokens committed (cost = votes²). This makes it exponentially more expensive to cast many votes, favoring a broader distribution of opinion. It was pioneered in Gitcoin Grants and explored by projects like Optimism for public goods funding.

03

Conviction Voting

A continuous voting system where voting power accrues over time as tokens are staked on a proposal. This measures the sustained intensity of support, not just a snapshot. It allows for dynamic prioritization and is well-suited for funding DAO treasuries, as seen in Commons Stack and 1Hive Gardens.

04

Delegated Voting

A representative model where token holders can delegate their voting power to a trusted expert or representative. This reduces voter apathy and leverages expertise, similar to a parliamentary system. It is a core feature of Compound and Uniswap governance, where delegates actively debate and vote on proposals.

05

Holographic Consensus / Forking

A strategy that uses prediction markets or forks to gauge sentiment. Voters signal by staking tokens on likely outcomes. If a proposal gains enough support, it can bypass a full vote via a ragequit-style fork mechanism, as conceptualized in Moloch DAOs. It prioritizes high-signal, high-conviction proposals.

06

Multisig / Council Voting

Voting power is restricted to a predefined set of addresses, typically a multisignature wallet controlled by a council or core team. This is a common early-stage governance model for speed and security before full decentralization. It is not token-weighted but based on peer approval among key signers.

ecosystem-usage
VOTING STRATEGY

Ecosystem Usage & Protocol Examples

Voting strategies are the computational logic that determines voting power in decentralized governance, moving beyond simple token-weighted models to enable more sophisticated and inclusive decision-making.

01

Token-Weighted Voting

The most common strategy where voting power is directly proportional to the quantity of a governance token held. This aligns influence with economic stake but can lead to plutocracy.

  • Examples: Uniswap (UNI), Compound (COMP), Aave (AAVE).
  • Mechanism: 1 token = 1 vote, often with delegation options.
  • Limitation: Susceptible to vote buying and whale dominance.
02

Quadratic Voting

A strategy designed to reduce the power of large token holders by making the cost of votes increase quadratically. It aims to reflect the intensity of preference within a community.

  • Concept: Cost = (Number of Votes)². Buying 2 votes costs 4 credits, 3 votes costs 9 credits.
  • Implementation: Used by Gitcoin Grants for funding allocation to measure community sentiment.
  • Goal: Protects against sybil attacks and whale dominance when combined with identity verification.
03

Conviction Voting

A continuous, time-based voting model where voting power accrues the longer a voter supports a proposal. It is designed for ongoing funding decisions in DAO treasuries.

  • Mechanism: Users stake tokens on proposals. Voting power increases over time, but is withdrawn immediately if they change their vote.
  • Primary Use: Commons funding in DAOs like 1Hive Gardens.
  • Advantage: Filters for proposals with sustained, organic community support and allows for dynamic prioritization.
04

Delegated Voting & Liquid Democracy

A system where token holders can delegate their voting power to representatives or experts, who then vote on their behalf. This balances direct democracy with representative efficiency.

  • Examples: ENS DAO (delegates), Optimism Collective (Citizen House delegates).
  • Flexibility: Delegation can be specific to a topic (e.g., treasury management) or broad, and is revocable at any time.
  • Benefit: Reduces voter apathy and leverages subject-matter expertise within the community.
05

Multisig & Guardian Models

A strategy where voting power is concentrated among a small, trusted group of signers (a multisig) or a dedicated security council. This prioritizes security and execution speed over broad decentralization.

  • Use Case: Common for protocol upgrades and emergency actions in early-stage projects or layer-2 rollups (e.g., Arbitrum's Security Council).
  • Mechanism: Proposals require M-of-N signatures from pre-approved addresses.
  • Trade-off: Creates a more centralized point of control but mitigates coordination failure.
06

Non-Token Based Strategies

Strategies that decouple governance rights from financial stake, using alternative metrics to allocate voting power. This aims to better align influence with contribution or participation.

  • Proof-of-Personhood: One-person-one-vote systems using verified unique identities (e.g., Worldcoin's Proof of Personhood).
  • Reputation-Based: Voting power based on non-transferable reputation scores earned through contributions (pioneered by Colony).
  • NFT-Based: Ownership of a specific non-financial NFT (e.g., a membership pass) grants voting rights.
ON-CHAIN GOVERNANCE

Voting Strategy Comparison

A technical comparison of common mechanisms for aggregating and recording voter preferences in DAOs and decentralized protocols.

Feature / MetricToken-WeightedQuadratic VotingConviction Voting

Core Mechanism

One token, one vote

Cost scales quadratically with vote weight

Voting power accrues over time

Sybil Resistance

Capital Efficiency

High

Low

Medium

Vote Finality

Immediate

Immediate

Delayed (Dynamic)

Gas Cost per Vote

Low

High

Medium to High

Whale Influence

High

Mitigated

Temporally Mitigated

Typical Use Case

Protocol parameter votes

Public goods funding

Continuous budgeting

security-considerations
VOTING STRATEGY

Security & Game Theory Considerations

Voting strategies in decentralized governance are mechanisms that determine how voting power is allocated and aggregated. Their design is critical for network security, resistance to manipulation, and ensuring outcomes reflect genuine stakeholder intent.

01

Sybil Resistance

A core security property that prevents a single entity from creating many fake identities (Sybil attacks) to gain disproportionate voting power. Strategies achieve this by linking voting power to a scarce, costly-to-acquire resource, such as:

  • Token ownership (1 token = 1 vote)
  • Locked capital (e.g., ve-token models)
  • Reputation or soulbound tokens (non-transferable identity)
02

Vote Buying & Bribery

A major game-theoretic attack where a party offers direct compensation to token holders to vote a specific way, undermining the governance's integrity. Counter-strategies include:

  • Secret voting (e.g., zk-SNARKs) to hide votes until they are committed.
  • Conviction voting, which requires a time-lock to amplify voting power, making bribery less efficient.
  • Minimal anti-collusion infrastructure designed to detect and penalize coordinated bribery.
03

Whale Dominance

The risk that a small number of large token holders (whales) can unilaterally dictate governance outcomes, leading to centralization and potential tyranny of the majority. Mitigations include:

  • Quadratic voting, where cost scales quadratically with votes cast, favoring broad consensus.
  • Delegation to knowledgeable, smaller stakeholders.
  • Vote escrow models that reward long-term commitment over sheer capital.
04

Voter Apathy & Rational Ignorance

The economic reality where the cost for a token holder to become informed on a proposal outweighs the marginal benefit of their single vote, leading to low participation. Strategies to combat this include:

  • Delegative democracy (liquid democracy), where users can delegate votes to experts.
  • Bonded voting or skin-in-the-game models that require depositing funds, aligning voter incentives with outcomes.
  • Gasless voting via meta-transactions to reduce participation costs.
05

Proposal Inertia & Timelocks

Security mechanisms that introduce deliberate delays between a vote passing and its execution. This protects the protocol by providing a final safeguard against malicious proposals that have passed due to a short-term attack. Key aspects:

  • A timelock period allows the community to react (e.g., exit funds) if a harmful proposal passes.
  • Creates a cooling-off period for critical decisions, enabling review and potential veto through social consensus or fork.
06

Forking as Ultimate Recourse

In blockchain governance, the ability for a dissenting minority to fork the protocol—creating a new chain with different rules—is the ultimate game-theoretic backstop. This influences strategy by:

  • Imposing a cost of exit on the majority; if they act maliciously, they risk losing network value to a fork.
  • Making governance less about absolute control and more about maintaining broad legitimacy to avoid chain splits.
VOTING STRATEGY

Technical Implementation Details

Voting strategies are the computational logic that determines how voting power is allocated in decentralized governance. This section details their architecture, security considerations, and implementation patterns.

A voting strategy is a smart contract that defines the rules for calculating a user's voting power for a specific proposal. It works by implementing a standard interface, typically a getVotingPower function, which is called by the governance framework when a user casts a vote. The function takes parameters like the voter's address, a block number (snapshot), and the proposal context, then returns a numerical power value. This power can be derived from token balances, NFT ownership, delegated stakes, or custom on-chain metrics. The strategy's logic is executed on-chain, ensuring the vote calculation is transparent, verifiable, and resistant to manipulation.

VOTING STRATEGY

Frequently Asked Questions (FAQ)

Essential questions and answers for developers and DAO participants on the technical implementation, security, and mechanics of on-chain voting.

A voting strategy is the smart contract logic that determines how voting power is calculated for each participant in a decentralized autonomous organization (DAO). It defines the rules for token weighting, delegation, and eligibility. Common strategies include token-weighted voting (one token, one vote), quadratic voting (where power scales with the square root of tokens held to reduce whale dominance), and delegated voting (where users can delegate their voting power to representatives). The strategy is a critical, immutable component of a DAO's governance module, directly impacting proposal outcomes and the organization's decentralization.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team