Snapshot-Based Voting Vulnerabilities
Snapshot-based voting vulnerabilities arise when protocols record the token balances of participants at a specific block height to determine voting weight. While this method is efficient for off-chain governance, it creates specific weaknesses if not integrated with other security layers.
Attackers can manipulate their holdings specifically for the snapshot block by borrowing tokens or transferring them between wallets just before the block is recorded. Once the snapshot is taken, they can move the assets elsewhere, effectively gaining influence without long-term commitment.
This undermines the alignment of interests between voters and the protocol's success. Furthermore, if the snapshot is not sufficiently randomized or if the timing is predictable, it becomes easy to exploit.
Protocols mitigate this by using time-weighted average balances or by requiring tokens to be locked for the duration of the voting period.