A governance attack happens when a bad actor accumulates enough voting power in a decentralized protocol to push through a proposal that benefits themselves, usually at the expense of everyone else. Most DeFi protocols give their users the ability to vote on decisions like fee changes, treasury spending, or upgrades to the code. That voting power is typically tied to how many governance tokens a person holds. When someone buys or borrows a massive amount of those tokens specifically to win a vote, that is a governance attack.

The mechanics are straightforward, and that is part of what makes it dangerous. Imagine a homeowners’ association where every vote is decided by how many shares of the building you own. Now imagine a stranger quietly buying up the majority of those shares overnight, walking into the next meeting, and voting to transfer the building’s entire maintenance fund into their own bank account, all within the rules of the system. No lock was picked. No alarm went off. The attack succeeded because the rules themselves were exploited. Governance attacks work the same way: the attacker does not break the protocol, they use it exactly as designed.

The most cited real-world example is the Beanstalk hack in April 2022. An attacker took out a flash loan, a type of uncollateralized loan that must be borrowed and repaid within a single transaction, to temporarily acquire a majority of Beanstalk’s governance tokens. They used that voting power to pass a malicious proposal that drained approximately $182 million from the protocol’s treasury. The loan was repaid in the same transaction. The entire attack, from setup to execution, took place in seconds.

Protocols have developed several defenses against governance attacks. Time locks are one of the most common, they introduce a mandatory delay between when a proposal passes and when it takes effect, giving the community time to spot something suspicious and respond. Other protocols require a minimum voting period, set a quorum threshold so that a small group cannot decide outcomes for everyone, or distribute governance tokens broadly enough that no single entity can realistically amass a majority.

Join our newsletter

Governance attacks expose a fundamental tension in decentralized systems: the same openness that makes them trustless and permissionless also makes them vulnerable to anyone with enough capital and the will to exploit the rules. If you hold governance tokens in any protocol, it is worth paying attention to active proposals, not just as a right, but as a responsibility. One unchecked vote can unwind what took a community years to build.

Disclaimer: Coin Medium is not responsible for any losses or damages resulting from reliance on any content, products, or services mentioned in our articles or content belonging to the Coin Medium brand, including but not limited to its social media, newsletters, or posts related to Coin Medium team members.

Related Terms

Finality

The finality of a blockchain transaction marks the moment when it becomes impossible to change or delete the transaction from the permanent record. After finality is achieved through a transaction process, the transaction becomes permanent because no method exists to modify or delete it except through network system changes. Cryptocurrency systems depend on finality as an essential principle because it establishes the moment when users can treat their transactions as complete. Blockchains use various methods to achieve finality through different

Funding Rate

In crypto, funding rate is a mechanism designed to keep the price of a perpetual futures contract (perpetual swap) closely aligned with the actual market price of the underlying asset, known as the spot price. Unlike traditional futures that expire, perpetuals have no expiry date. To prevent the contract price from drifting too far from the actual spot price, exchanges use the funding rate as an automatic balancing mechanism. The funding rate prevents a mismatch by facilitating periodic payments between

Escrow

Escrow is a financial arrangement that uses a neutral third party to hold money or property for two parties, until they fulfill their agreed-upon obligations. Escrow functions to protect both parties from complete trust in each other during the process of contract execution. The escrow agent distributes the funds or assets to the designated recipient after all specified conditions have been met. Escrow functions as a standard practice in real estate deals, business mergers, freelance agreements, and major internet purchases