Token-Weighted Voting Vulnerabilities
Token-weighted voting vulnerabilities arise from the direct correlation between the number of tokens held and voting power. This system naturally favors large investors, who may have interests that diverge from the long-term health of the protocol.
Attackers can exploit this by purchasing enough tokens to pass proposals that extract value from the protocol at the expense of other users. Furthermore, if a large percentage of tokens are held by a few addresses, the protocol is highly susceptible to manipulation.
To address this, many protocols are experimenting with alternative models like quadratic voting or reputation-based systems. These alternatives aim to dampen the influence of extreme wealth and promote a more democratic, meritocratic approach to decision-making.