Dormant Token Stake Risks

Dormant token stake risks arise when a large portion of the voting power is held by tokens that are not actively managed or monitored. These "sleeping" tokens can be targeted by attackers who might attempt to compromise the wallets holding them or acquire them in a secondary market to gain control.

If a significant percentage of the supply is inactive, it becomes much easier for a motivated actor to reach a quorum. This is a common problem in many DAOs where early holders or lost wallets represent a large portion of the voting power.

It effectively lowers the bar for a governance attack. Mitigating this risk involves encouraging active participation, implementing mechanisms to "slash" or reduce the power of inactive tokens, or using delegated voting to ensure that power is held by active members.

It is a critical issue for the security of decentralized governance. Understanding the distribution of active vs. dormant tokens is essential for assessing the true vulnerability of a protocol to a governance attack.

Venue Connectivity Risks
Token Utility Lifecycle
Token Distribution Fairness
Variable Shadowing Risks
Token Supply Elasticity
Execution Latency Risks
Whale Wallet Monitoring
Token Utility versus Security Distinction