Governance Manipulation
Governance manipulation occurs when an actor or group of actors exploits the voting mechanisms of a decentralized protocol to pass proposals that benefit their private interests. This often involves accumulating a significant percentage of governance tokens to gain majority voting power.
Once control is achieved, the attackers may vote to drain treasury funds, change protocol parameters to lower security, or redirect revenue streams to addresses they control. In some cases, attackers use flash loans to temporarily borrow massive amounts of governance tokens to exert control over a single vote, execute a malicious action, and then repay the loan within the same block.
This behavior undermines the legitimacy of decentralized autonomous organizations and can lead to total loss of user funds. Defensive measures include implementing voting delays, timelocks on changes, and reputation-based voting systems that are harder to game with mere capital.