Governance Hijacking
Governance hijacking occurs when an attacker gains enough voting power to pass malicious proposals that drain a protocol's treasury or change its economic parameters. This can happen through the accumulation of governance tokens or by exploiting flaws in the voting process itself.
Once control is seized, the attacker can drain liquidity pools, mint new tokens, or alter the protocol's fee structure for personal gain. This risk is particularly high in protocols with low voter participation or concentrated token distribution.
It emphasizes the importance of decentralized governance security and the risks of centralizing power in autonomous systems. Security requires robust voting delay periods and emergency exit mechanisms.