Governance Hijacking
Meaning ⎊ Gaining malicious control over a protocol by seizing voting power to pass harmful changes or drain funds.
Whale Influence Dynamics
Meaning ⎊ The study of how large capital holders affect market volatility, liquidity, and governance outcomes in crypto networks.
Proposal Timelock Bypass
Meaning ⎊ Methods to circumvent mandatory governance delays to execute unauthorized protocol changes instantly.
Stakeholder Concentration Analysis
Meaning ⎊ Measuring the distribution of voting power to identify risks of centralization and collusion.
Token Concentration Risk
Meaning ⎊ The risk posed by centralized control when a few entities hold a majority of governance power in a protocol.
On-Chain Voting Quorum Vulnerabilities
Meaning ⎊ Insecurely low or manipulatable voting thresholds that allow attackers to force changes with minimal token influence.
Governance Attack Pricing
Meaning ⎊ Governance Attack Pricing quantifies the capital requirements and systemic risks involved in acquiring control over decentralized protocol operations.
Quorum Threshold Manipulation
Meaning ⎊ The strategic subversion of minimum voting requirements to either force through malicious changes or cause governance gridlock.
Flash Loan Voting Exploits
Meaning ⎊ Using instant, uncollateralized loans to temporarily control governance and pass malicious protocol changes.
Token Concentration Risks
Meaning ⎊ The threat to decentralized governance when a few entities control the majority of voting power.
Privileged Functions
Meaning ⎊ Admin-only commands that control protocol parameters, security settings, or fund access within a smart contract system.
Governance Role Hijacking
Meaning ⎊ The takeover of administrative or voting roles to seize control of protocol governance and treasury assets.
Proxy Contract Ownership
Meaning ⎊ Control over upgradeable smart contract logic, where the proxy owner can replace the implementation with malicious code.
Proposal Timelock Evasion
Meaning ⎊ Exploiting flaws in governance logic to bypass mandatory waiting periods intended to protect users from harmful changes.
Governance Backdoor Exploits
Meaning ⎊ The manipulation of decentralized voting systems to gain unauthorized control over protocol assets or administrative functions.
