<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>blockful blog</title>
        <link>https://paragraph.com/@blockful</link>
        <description>Research that maps DAO governance risks, identifies governance capture vectors, and provides actionable governance security insights.</description>
        <lastBuildDate>Sun, 19 Apr 2026 12:17:28 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <image>
            <title>blockful blog</title>
            <url>https://storage.googleapis.com/papyrus_images/98528dcb689d24ac14f2ff3888acbe966f451d1e06ee547119e294da54213b67.jpg</url>
            <link>https://paragraph.com/@blockful</link>
        </image>
        <copyright>All rights reserved</copyright>
        <item>
            <title><![CDATA[How $40M Were Almost Stolen from Lazy Summer]]></title>
            <link>https://paragraph.com/@blockful/lazy-summer-attack</link>
            <guid>BQVTcwvl0shEPIcX6O2P</guid>
            <pubDate>Wed, 15 Apr 2026 16:11:19 GMT</pubDate>
            <description><![CDATA[When the target isn’t a DAO’s treasury, but what it controls.]]></description>
            <content:encoded><![CDATA[<div data-type="x402Embed"></div><p>A <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.tally.xyz/gov/lazy-summer-dao-official/proposal/20187383025022346489297914643072678675588347037594683824379448703234496405235">proposal titled "Revoke Old V1 Roles and Cleanup for V1→V2 Finalization</a>" was submitted to Lazy Summer this week.</p><p>Behind twelve on-chain calls dressed as post-migration maintenance, <strong>one line would have handed a plain, anonymous wallet the master key to a protocol managing $40 million in user funds across three chains. </strong></p><p>The proposal was caught and canceled, thanks to the coordinated response of the Lazy Summer Guardian members, who identified the attack and moved to stop it before it reached execution. But it was closer than it sounds.</p><h2 id="h-background-what-is-lazy-summer" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Background: What is Lazy Summer</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://summer.fi/">Lazy Summer</a> is a multi-chain yield optimization protocol. Users deposit into vaults (called Fleets), which allocate capital across a set of yield strategies (ARKs): Morpho, Aave, Fluid, and others. The protocol was managing roughly $40M in TVL across Ethereum, Base, Arbitrum, and Sonic.</p><p>The entire access structure of the protocol flows through a single contract: the <code>ProtocolAccessManager</code> (<code>0xf389BCEa...</code>). Think of it as the master key for the building. It defines who can do what: rebalance a vault, onboard a new strategy or trigger emergency procedures.</p><p>At the top of this hierarchy sits <code>GOVERNOR_ROLE</code>. Whoever holds it can grant or revoke any other role in the system. It is the only role that requires no second check.</p><p>Governance decisions flow through a <code>summerGovernor</code> contract (OZ Governor with TimelockControl) and a <code>SummerTimelockController</code> with a 48-hour delay before execution. The Timelock uses the standard OpenZeppelin role model: <code>PROPOSER_ROLE</code> to schedule operations, <code>CANCELLER_ROLE</code> to abort them.</p><h2 id="h-timeline" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Timeline</h2><p>In November 2025, Lazy Summer DAO finalized its transition from Governance V1 to V2. The Foundation multisig, which had been added as a co-governor during the transition, formally stepped back. Governance V2 powered, by locked SUMR tokens, became the sole decision-making layer.</p><p>In February 2026, SIP0.2 passed. It created a Guardian Module with emergency risk controls — a tightly scoped role that can cancel any proposal at any stage, without requiring quorum or voting power. The design intent was clear, the DAO needed a last-resort protection</p><p>In April 2026, Proposal ID <code>20187383...235</code> was submitted to the <code>summerGovernor</code> on Base under the title "SIP5.31: Revoke Old V1 Roles and Cleanup for V1→V2 Finalization." </p><p>The proposal carried 12 on-chain calls targeting 3 contracts, structured to replicate its effects on Ethereum and Arbitrum via LayerZero. The proposer held 10.001 $SUMR - just one token above the quorum threshold of 10.000 $SUMR. At the token price at the time, this means the attacker was positioned to drain $40M.</p><p>It was canceled before it reached execution after Guardian members identified the malicious intent embedded in the calldata.</p><h2 id="h-diving-deeper-into-the-proposal" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Diving deeper into the proposal</h2><p>We retrieved the full calldata via the Tally GraphQL API and decoded each function call against the deployed contract ABIs. Here is what SIP5.31 actually contained:</p><h3 id="h-calls-on-the-summertimelockcontroller" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Calls on the SummerTimelockController</h3><p>The <code>SummerTimelockController</code> is the protocol's mandatory waiting room. Every governance decision — once approved by vote — must pass through it before taking effect. It holds an enforced 48-hour delay during which an authorized party can still cancel the operation if something looks wrong. </p><br><table><colgroup><col><col><col><col></colgroup><tbody><tr><th colspan="1" rowspan="1" colwidth="79"><p>#</p></th><th colspan="1" rowspan="1"><p>Function</p></th><th colspan="1" rowspan="1" colwidth="205"><p>Account</p></th><th colspan="1" rowspan="1"><p>Assessment</p></th></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>1</p></td><td colspan="1" rowspan="1"><p><code>revokeRole(CANCELLER_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>summerGovernor</p></td><td colspan="1" rowspan="1"><p>Removes the Governor's ability to cancel queued Timelock ops</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>2</p></td><td colspan="1" rowspan="1"><p><code>revokeRole(EXECUTOR_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>summerGovernor</p></td><td colspan="1" rowspan="1"><p>Low impact — executor is already <code>address(0)</code></p></td></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>3</p></td><td colspan="1" rowspan="1"><p><code>revokeRole(PROPOSER_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>Foundation Multisig</p></td><td colspan="1" rowspan="1"><p>Legitimate V1 cleanup</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>4</p></td><td colspan="1" rowspan="1"><p><code>revokeRole(CANCELLER_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>Foundation Multisig</p></td><td colspan="1" rowspan="1"><p>Combined with #1: no address retains CANCELLER_ROLE</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>5</p></td><td colspan="1" rowspan="1"><p><code>revokeRole(DEFAULT_ADMIN_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>Foundation Multisig</p></td><td colspan="1" rowspan="1"><p>Legitimate V1 cleanup</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="79"><p>10</p></td><td colspan="1" rowspan="1"><p><code>grantRole(PROPOSER_ROLE)</code></p></td><td colspan="1" rowspan="1" colwidth="205"><p>summerGovernor</p></td><td colspan="1" rowspan="1"><p>Legitimate: ensures V2 Governor can schedule</p></td></tr></tbody></table><h3 id="h-calls-on-the-protocolaccessmanager" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Calls on the ProtocolAccessManager</h3><p>The <code>ProtocolAccessManager</code> is the master access control contract for the entire protocol.Every permission in the system flows through it. At its top sits <code>GOVERNOR_ROLE</code>: whoever holds it can grant or revoke any other role instantly, without any delay.</p><br><table><colgroup><col><col><col><col></colgroup><tbody><tr><th colspan="1" rowspan="1" colwidth="72"><p>#</p></th><th colspan="1" rowspan="1"><p>Function</p></th><th colspan="1" rowspan="1" colwidth="202"><p>Account</p></th><th colspan="1" rowspan="1"><p>Assessment</p></th></tr><tr><td colspan="1" rowspan="1" colwidth="72"><p>6</p></td><td colspan="1" rowspan="1"><p><code>revokeDecayControllerRole</code></p></td><td colspan="1" rowspan="1" colwidth="202"><p>summerGovernor</p></td><td colspan="1" rowspan="1"><p>Removes Governor's control over token decay parameters</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="72"><p>7</p></td><td colspan="1" rowspan="1"><p><code>grantGovernorRole</code></p></td><td colspan="1" rowspan="1" colwidth="202"><p>SummerTimelockController</p></td><td colspan="1" rowspan="1"><p>Legitimate: Timelock needs GOVERNOR_ROLE to execute</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="72"><p><strong>8</strong></p></td><td colspan="1" rowspan="1"><p><code>grantGovernorRole</code></p></td><td colspan="1" rowspan="1" colwidth="202"><p><code>0xb0f5873f...</code></p></td><td colspan="1" rowspan="1"><p><strong>ATTACK: unknown EOA receives GOVERNOR_ROLE</strong></p></td></tr><tr><td colspan="1" rowspan="1" colwidth="72"><p>9</p></td><td colspan="1" rowspan="1"><p><code>grantDecayControllerRole</code></p></td><td colspan="1" rowspan="1" colwidth="202"><p>SUMR Token</p></td><td colspan="1" rowspan="1"><p>Operational: token manages its own decay</p></td></tr></tbody></table><h3 id="h-cross-chain-replication-via-layerzero" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Cross-chain replication via LayerZero</h3><p>Lazy Summer operates across multiple chains. Its governance, however, lives on Base, where proposals are voted on and executed. To make governance decisions take effect on Ethereum and Arbitrum as well, the protocol uses LayerZero: a cross-chain messaging protocol that forwards the same on-chain calls to other networks after a Base approval. </p><p>Calls #11 and #12 are exactly that — a mirror of the first ten calls, dispatched automatically to Ethereum and Arbitrum the moment the Base proposal executes.</p><br><table><colgroup><col><col><col></colgroup><tbody><tr><th colspan="1" rowspan="1" colwidth="80"><p>#</p></th><th colspan="1" rowspan="1"><p>Destination</p></th><th colspan="1" rowspan="1"><p>Action</p></th></tr><tr><td colspan="1" rowspan="1" colwidth="80"><p>11</p></td><td colspan="1" rowspan="1"><p>Ethereum (<code>dstEid=30101</code>)</p></td><td colspan="1" rowspan="1"><p>Replicates calls 1–10 on Ethereum</p></td></tr><tr><td colspan="1" rowspan="1" colwidth="80"><p>12</p></td><td colspan="1" rowspan="1"><p>Arbitrum (<code>dstEid=30110</code>)</p></td><td colspan="1" rowspan="1"><p>Replicates calls 1–10 on Arbitrum</p></td></tr></tbody></table><br><p>The important insights here are:</p><ul><li><p>Call #8 grants <code>GOVERNOR_ROLE</code> on the <code>ProtocolAccessManager</code> to <code>0xb0f5873f33b540f4e710404a730aa6a62c6118f2</code> - a plain EOA with no code, no documented role in the protocol, and no meaningful transaction history.</p></li><li><p>Calls #1 and #4 together eliminate every holder of <code>CANCELLER_ROLE</code> in the Timelock, with no replacement. Call #10 only restores <code>PROPOSER_ROLE</code> — not <code>CANCELLER_ROLE</code>.</p></li><li><p>Calls #11 and #12 are not decorative. They propagate the same role grants to Ethereum and Arbitrum via LayerZero, meaning a single governance approval in Base would have compromised the protocol across all its deployed chains simultaneously.</p></li></ul><h2 id="h-the-cognitive-attack-surface" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The cognitive attack surface</h2><p><strong>The proposal contains 10 legitimate actions and 2 malicious ones</strong>. A reviewer who confirms that calls #3, #4, #5, #7, and #10 are correct - and they are - is primed to trust the rest of the package. The pattern is structurally identical to a SQL injection embedded in an otherwise valid query. The malicious payload hides inside context that is supposed to be safe.</p><p>The title does the rest. "V1→V2 cleanup" is exactly what the DAO expected to see at this stage of its governance lifecycle. The Foundation multisig did need its roles removed. The Governor did need their <code>PROPOSER_ROLE</code> confirmed. The proposal reads as institutional hygiene - until you decode every call individually.</p><h2 id="h-what-would-have-happened" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">What would have happened</h2><p>With <code>GOVERNOR_ROLE</code> on the <code>ProtocolAccessManager</code>, the attacker could have acted immediately - no Timelock, no delay, no governance vote required.</p><p>The first moves would have been straightforward:</p><ol><li><p>Grant <code>CURATOR_ROLE</code> over any <code>FleetCommander</code>: alter allocation caps, buffer thresholds, strategy composition.</p></li><li><p>Grant <code>COMMANDER_ROLE</code> over any ARK: directly control deposits and withdrawals for individual yield strategies.</p></li><li><p>Grant <code>GUARDIAN_ROLE</code> to themselves: acquire the ability to submit governance proposals without holding any SUMR.</p></li><li><p>Revoke <code>GUARDIAN_ROLE</code> from existing guardians eliminate the only emergency brake.</p></li></ol><p>The second-order effect is worse. With no <code>CANCELLER_ROLE</code> holder left in the Timelock after calls #1 and #4, any new malicious operation queued in the Timelock could not be canceled by the DAO. The DAO would have been able to schedule a fix, but not abort the damage being done in parallel.</p><br><table><colgroup><col><col><col></colgroup><tbody><tr><th colspan="1" rowspan="1"><p>Chain</p></th><th colspan="1" rowspan="1"><p>TVL at risk</p></th><th colspan="1" rowspan="1"><p>Exposure</p></th></tr><tr><td colspan="1" rowspan="1"><p>Ethereum</p></td><td colspan="1" rowspan="1"><p>$34.6M</p></td><td colspan="1" rowspan="1"><p>Replicated via LayerZero</p></td></tr><tr><td colspan="1" rowspan="1"><p>Base</p></td><td colspan="1" rowspan="1"><p>$4.6M</p></td><td colspan="1" rowspan="1"><p>Primary attack chain</p></td></tr><tr><td colspan="1" rowspan="1"><p>Arbitrum</p></td><td colspan="1" rowspan="1"><p>$729K</p></td><td colspan="1" rowspan="1"><p>Replicated via LayerZero</p></td></tr><tr><td colspan="1" rowspan="1"><p><strong>Total</strong></p></td><td colspan="1" rowspan="1"><p><strong>$39.92M</strong></p></td><td colspan="1" rowspan="1"><div data-type="x402Embed"></div></td></tr></tbody></table><h2 id="h-the-antidote-guardian-cancellation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The antidote: Guardian cancellation</h2><p>The <code>summerGovernor</code> implements a non-standard exception in its cancellation logic:</p><pre data-type="codeBlock" text="function cancel(...) {
    address proposer = proposalProposer(proposalId);
    if (
        _msgSender() != proposer &amp;&amp;
        getVotes(proposer, block.timestamp - 1) &gt;= proposalThreshold() &amp;&amp;
        !isActiveGuardian(_msgSender())  // guardian bypasses all restrictions
    ) {
        revert SummerGovernorCannotCancelProposal(...);
    }
    return _cancel(...);
}
"><code><span class="hljs-function"><span class="hljs-keyword">function</span> <span class="hljs-title">cancel</span>(<span class="hljs-params">...</span>) </span>{
    <span class="hljs-keyword">address</span> proposer <span class="hljs-operator">=</span> proposalProposer(proposalId);
    <span class="hljs-keyword">if</span> (
        _msgSender() <span class="hljs-operator">!</span><span class="hljs-operator">=</span> proposer <span class="hljs-operator">&amp;</span><span class="hljs-operator">&amp;</span>
        getVotes(proposer, <span class="hljs-built_in">block</span>.<span class="hljs-built_in">timestamp</span> <span class="hljs-operator">-</span> <span class="hljs-number">1</span>) <span class="hljs-operator">&gt;</span><span class="hljs-operator">=</span> proposalThreshold() <span class="hljs-operator">&amp;</span><span class="hljs-operator">&amp;</span>
        <span class="hljs-operator">!</span>isActiveGuardian(_msgSender())  <span class="hljs-comment">// guardian bypasses all restrictions</span>
    ) {
        <span class="hljs-keyword">revert</span> SummerGovernorCannotCancelProposal(...);
    }
    <span class="hljs-keyword">return</span> _cancel(...);
}
</code></pre><p>Any address with an active <code>GUARDIAN_ROLE</code>, checked live against the <code>ProtocolAccessManager</code> via <code>isActiveGuardian()</code>, can cancel any proposal at any stage before execution.</p><p><strong>This is the mechanism that stopped SIP5.31.</strong> The Guardian members coordinated to identify the proposal, decode its intent, and execute the cancellation before execution became possible. The response required both technical capacity and human coordination under time pressure.</p><p>J<strong>ensei, from Lazy Summer team and one of the Guardians, identified the attack together with Chris</strong> (also from the Lazy Summer team). He described the moment: <em>"I wrote to Chris, as we discovered the proposal together, to send the statement once I get it </em><span data-name="grinning_face_with_big_eyes" class="emoji" data-type="emoji">😃</span><em>"</em></p><p>The critical observation is that <strong>this defense only existed because of a prior governance decision</strong>. </p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://gov.summer.fi/dao/proposal/108093388136831773407292946235331649189762991144555290509377111240682330256900">SIP0.2, approved in February 2026</a>, was the proposal that established the Guardian Module. Without it, the cancellation path would not have been available, and the 48-hour Timelock window would have been the only line of defense, a window the proposal itself was designed to exploit by removing all <code>CANCELLER_ROLE</code> holders before execution.</p><h2 id="h-preventing-it" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Preventing it</h2><p>The industry standard for governance security tends toward reactivity: something goes wrong, a patch is applied. <strong>Lazy Summer's Guardian Module is a counter-example, because it was built before it was needed.</strong></p><p>It is also worth noting the structural difference between the Governor that was attacked and the one currently in use. Governor V1, the target of SIP5.31, used plain $SUMR as its governance token. With a proposal threshold of just 10.000 SUMR, the economic barrier to submit a malicious proposal was approximately $20. Governor V2, the current system, uses stSUMR: a staked, locked version of the token. This significantly raises the cost and time required to accumulate governance power.</p><p>Lazy Summer team will also <strong>increase the quorum in Governor V2 and formally disconnect from Governor V1</strong> in the coming weeks, eliminating the attacked surface.</p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <category>security</category>
            <category>daos</category>
            <category>defi</category>
            <enclosure url="https://storage.googleapis.com/papyrus_images/e7ee1f2f68a862346e06d87f4e4aae2fa8a2f21926506618c1e1c9f278d6be05.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Shutter DAO 0x36: White Hat Governance Security Response and Emergency Mitigation ]]></title>
            <link>https://paragraph.com/@blockful/shutter-attack-prevention</link>
            <guid>XLRHBmYz5pqnT1g5IdYk</guid>
            <pubDate>Tue, 17 Mar 2026 20:35:25 GMT</pubDate>
            <description><![CDATA[We have prevented a critical potential exploit in Shutter DAO (0x36): ~$100K of governance tokens could capture a treasury of +$3M]]></description>
            <content:encoded><![CDATA[<h4 id="h-this-analysis-was-conducted-using-the-anticapture-framework-all-governance-security-data-for-shutter-dao-0x36-is-available-on-the-anticapture-dashboard" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">This analysis was conducted using the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blockful.gitbook.io/anticapture/anticapture/framework"><strong>Anticapture framework</strong></a>.  All governance security data for Shutter DAO (0x36) is available on the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/shu/"><strong>Anticapture Dashboard</strong></a><strong>.</strong></h4><div data-type="embedly" src="https://blockful.gitbook.io/anticapture/anticapture/framework" data="{&quot;provider_url&quot;:&quot;https://blockful.gitbook.io&quot;,&quot;description&quot;:&quot;The Anticapture Framework evaluates DAO governance security by mapping common attack vectors and defining protective metrics. It translates complex risks into measurable indicators, enabling DAOs to anticipate vulnerabilities before they escalate. By assigning risk levels (low, medium, high), it categorizes each DAO into stages of security maturity.&quot;,&quot;title&quot;:&quot;Anticapture Framework | Anticapture&quot;,&quot;mean_alpha&quot;:83.7936507937,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://blockful.gitbook.io/anticapture/anticapture/framework&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/b0ceb5d835084df41778f2c6097346c0a417d10272624e547532139a486b6248.png&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Gitbook&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:630,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:1200,&quot;height&quot;:630,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/b0ceb5d835084df41778f2c6097346c0a417d10272624e547532139a486b6248.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/b0ceb5d835084df41778f2c6097346c0a417d10272624e547532139a486b6248.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://blockful.gitbook.io/anticapture/anticapture/framework" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>Anticapture Framework | Anticapture</h2><p>The Anticapture Framework evaluates DAO governance security by mapping common attack vectors and defining protective metrics. It translates complex risks into measurable indicators, enabling DAOs to anticipate vulnerabilities before they escalate. By assigning risk levels (low, medium, high), it categorizes each DAO into stages of security maturity.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://blockful.gitbook.io</span></div><img src="https://storage.googleapis.com/papyrus_images/b0ceb5d835084df41778f2c6097346c0a417d10272624e547532139a486b6248.png" alt="Anticapture Framework | Anticapture"></div></a></div></div><hr><h2 id="h-summary" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Summary</h2><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.shutter.network/shutter-dao">Shutter DAO (0x36)</a> was susceptible to governance capture through which a malicious actor could use the governance system to drain the treasury. The combination of <strong>1) low market capitalization, 2) low active voting power, 3) absence of security guardrails, 4) no proposal spam protection and 5) relevant treasury in non-governance token, created a profitable and easy to execute attack vector.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/da227f5a86d48c789f55fe80042c1861e57e388ff30002ca7454f8ebd5c6e816.png" blurdataurl="data:image/png;base64,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" nextheight="1340" nextwidth="2290" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/shu/risk-analysis"><strong>Click to check Shutter data on Anticapture</strong></a></figcaption></figure><p>Treasury stablecoin reserves totalled approximately $3M. Quorum was achievable for approximately $100k in token purchases, a ratio exceeding 30x.</p><p>We identified this vulnerability in early 2025 during active governance security work within the Ethereum ecosystem. After more than a year of engagement with stakeholders, multiple mitigation approaches considered and discarded, and a controlled simulation validating the attack path, we coordinated an emergency mitigation with a small group of aligned delegates. In line with responsible security practice, we disclosed publicly only after the mitigation was in place.</p><hr><h2 id="h-the-vulnerability" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Vulnerability</h2><h3 id="h-this-is-not-a-code-vulnerability-its-an-incentive-failure" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">This is not a code vulnerability, it's an incentive failure.</h3><p>Shutter DAO (0x36) operates on a governance implementation built using Decent’s framework and the Azorius module. The token holder voting mechanism functions as designed: proposals are submitted, votes are cast, outcomes are executed. The configuration contained a critical gap in its defense parameters.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d75e215166d61526c32b98d62911b4882de737327d9f1f98db7597a577facac5.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAANCAIAAABHKvtLAAAACXBIWXMAABYlAAAWJQFJUiTwAAADf0lEQVR4nH1T32/aVhT2w162TOve9r4f75PWKtrWTIm6JqS0dASSLBnMjr1r49pAQBAIiUticBwutmOYB/lZtGQbgaSBUeSEsDSp1ElV3vc37GXac/swaapvR9hazfpkHd177v3Od853MQzDsDff+eDDT8ZpJra4BKYTZDDOz9wdHvNetd3ut7uvDjr6bM7rrgk3Dj4ddPTb3UMuT5/N6ZiY+njQgb3ieyO4/Vsfm8FeexvDerBrw7dsTpd70jvq8TjHv3KMTdqc7rnF9O9//hGKzy2pecVYpe4Eba5Rx9jkTff4wPDN/iF7/5C9E3Tj2vAtu3vM/iUx5Brv+9zmGJ3AGI6PziZkVWX5AEX7GI7zEKSayz376+nXBHG5t/ejK1e+GBl569Kl13t63n3vfcDxzHNw1v+/8IfCocgMSdM0ywHrZoykWRyws8mF6UjUQ5BTtG+K9nlJcOP2SFwQgqHQwPXBhBV8NjBwubcXp+gXAMxFbMFLfEMG40I6AzgeB4yHoPyhKEbe4fyAFVOyrGqxeQERICiaXq5UF1OSUSzu/FTOZBWSpnEKdOd0g6AA5Q9H5pMMx0/RPpwC05EoRlBgJi1l9FxcuAusDQQPQSqavlUqpSRJ0TSjuHqv9D0XCOAU6IBgGBR0TqHC0coLApyixWxKVhVRyvhD4e5sWdUKm1uyqkkwW1jfKKxvpCEE/3QfWEDFTnhxdISk2QuyLgIR6itQW/GHwpPWGHAKsIHgzm7l/s8Pmq12wzyq1hvVeqNuHj769QnC4/Pzx0/OWycPa82mmssj9a8gIGk2IkRFWRZlGJsXBDHNBoI4BQDH7+xW0O3t09Nmq/1jdR9qK8bamqxqS1klZ3wH9byay0Ndj84m/keBTxQTiqbmjIIoQzYQfO4BCjAcD/W8UVw1iqsrhlHY3FrbvCfBLCpiNrkQmxeSkiyI6TnLgai3jD8QjsX/TQAYaWFxOQMlmJVVtTMGhuPLe/vNVrvZatfNw4Z5ZB63d+/X0EisZA3qeQlmoZ5PSnKn8I5TLlyUzGrKtwbUNFlVkVikoLy3j7rfMI9aJw/N43bdNM1fThrmUa3ZNI/bJ2ePWqdnrdOzH6rVl13bUcAmhZmlZTm1DEVJRq5ACtZKpcpBbbtc2dzeqZuH2+VK5aBWrTfKe/uVg1phfUMQ0xLMijIMx+Ivvw9E8DeLFTJyh4C2ZgAAAABJRU5ErkJggg==" nextheight="1226" nextwidth="2940" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Governance parameters at the time of identification:</p><ul><li><p><strong>Proposal threshold: 1 SHU</strong></p></li><li><p><strong>Quorum requirement: 3% of total supply (30,000,000 SHU = ~100K USD)</strong></p></li><li><p><strong>Voting delay: (0 blocks)</strong></p></li><li><p><strong>Voting period: ~3 days (21,600 blocks)</strong></p></li><li><p><strong>Timelock: None (0 blocks)</strong></p></li><li><p><strong>Proposal limits: None</strong></p></li><li><p><strong>Hit-and-run prevention: None</strong></p></li><li><p><strong>Veto mechanism: None</strong></p></li></ul><p><strong>An actor could submit unlimited proposals with 1 SHU.</strong> With sufficient token accumulation to meet quorum independently, they could pass any proposal, including direct treasury withdrawal.</p><hr><h2 id="h-the-white-hat-path" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The White Hat Path</h2><p>We validated the following attack sequence in a controlled simulation environment using a forked state of the live governance contracts.</p><p><strong>Phase 1: Voting power accumulation.</strong> Purchase sufficient SHU on secondary markets to meet quorum independently. Current liquidity and market capitalization make this economically feasible at approximately $100k. We tested this by acquiring SHU through open market purchases, reaching 2.2 million tokens in 2 days without price impact, and since then the token price has dropped 30%. Showing that accumulation to the 30 million quorum threshold was operationally practical.</p><p><strong>Phase 2: Proposal spam.</strong> Submit multiple proposals simultaneously or in rapid succession. Each proposal requires only 1 SHU to create. No proposal limits, rate limiting, or delay mechanisms exist to prevent this behavior. A spam-proposal strategy imposes a very high defense cost on legitimate token holders attempting to coordinate a response: the attacker needs only one proposal to succeed, while defenders must vote against every single one.</p><p><strong>Phase 3: Treasury extraction.</strong> With quorum met through owned tokens, the attacker controls vote outcomes. Proposals transferring stablecoins from treasury to attacker-controlled addresses pass without intervention. No veto mechanism exists to block execution. No timelock exists to delay execution after a vote passes.</p><p>The economic incentive is significant: approximately $3M in stablecoin reserves against an approximately $100k cost of capture.</p><hr><h2 id="h-discovery-and-early-engagement" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Discovery and Early Engagement</h2><p>This vulnerability was identified in <strong>early 2025</strong>, by expanding Anticapture's coverage and integrating new governance systems. At the time, the DAO was even more exposed, with +$6m in liquid treasury.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b8278752a72440a37ee5a52d20d17897b61bdb7c44c151b591c328bc7208c38a.png" blurdataurl="data:image/png;base64,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" nextheight="1238" nextwidth="2290" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Upon identification, we disclosed the risk privately to key members of the Shutter community. The response was measured: the team assessed that they had sufficient defensive capability. We communicated that our simulations showed otherwise — no defensive cards were visible on-chain that would prevent the attack sequence we had validated.</p><p>Some time after this initial disclosure, a <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/shu/holders-and-delegates?tab=delegates&amp;drawerAddress=0x2379bD87Dc1Ae99C478811Eb546e1E61C3F14f7D&amp;drawerTab=votingPowerHistory"><u>delegation of approximately 60 million SHU</u></a> was consolidated into a single wallet, making it the largest delegate in the DAO. This was a meaningful defensive improvement. A large aligned voter capable of meeting quorum in opposition provides a real deterrent. However, this approach has structural limitations:</p><ul><li><p>It depends on a single wallet being available and responsive to every malicious proposal.</p></li><li><p>A spam-proposal strategy can exhaust even a well-resourced defender: the attacker submits many proposals, and the defender must vote against all of them. Only possible defense would be to have a script running with the private key, which also has it's own risks.</p></li><li><p>If the wallet is compromised or the key holder is unavailable during a voting period, the defense disappears entirely.</p></li><li><p>It creates a single point of failure in what should be a distributed governance system.</p></li></ul><p><strong>White hat capture considered and discarded.</strong> During this period, we evaluated a more aggressive approach: executing the attack ourselves as a white hat operation. The plan would involve buying 30M SHU tokens, changing the admin of the DAO, deploying a new instance of the DAO with corrected governance parameters, and returning admin. We chose not to proceed. The lack of support we found in the ecosystem to address the vulnerability through established channels left us without a clear path forward, and legal uncertainty around unauthorized capture — even with intent to return — created unacceptable risk. We had already disclosed to multiple parties that we understood the attack vector, making an anonymous operation impractical.</p><p><strong>Continued stakeholder engagement.</strong> We continued discussing the vulnerability with select individuals in the Ethereum ecosystem, seeking guidance on the best mitigation path: one that would not require us to take control of the DAO ourselves, that would survive public disclosure, and that could be implemented through legitimate governance.</p><p>In November 2025, at DevConnect in Buenos Aires, we were able to have more direct conversations with key members of the Shutter community. These conversations produced what we had been missing: introductions to aligned delegates with governance expertise, operational knowledge of Shutter DAO, and willingness to coordinate on a security response.</p><p>This was the turning point. After more than a year of knowing the vulnerability existed and searching for a viable path, we had a group capable of executing the mitigation.</p><hr><h2 id="h-why-now-why-this-way" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why Now, Why This Way</h2><p>The decision to act was driven by two factors.</p><ol><li><p>First, the economic context had not improved. Treasury value remained high, token price decreased even more, and the governance configuration remained unchanged since deployment. The vulnerability is not theoretical — it was economically actionable, and had been for over a year.</p></li><li><p>Second, we were not willing to wait indefinitely for a funding mechanism. Previous attempts to establish a path for compensated security work had not moved forward. We decided to act in the best interest of Ethereum's security and pursue retroactive compensation through proper governance channels. The alternative — continuing to sit on a known, exploitable vulnerability — was not acceptable.</p></li></ol><p><strong>Why the “Security Council” Approach.</strong> We evaluated multiple mitigation strategies. The critical constraint was this: any mitigation that changes governance rules (proposal thresholds, proposer gating, voting parameters) only takes effect after the proposal passes and executes. During the voting period, the DAO remains fully exposed under the old rules. If the vulnerability details become public at the moment of proposal submission — which they do, since the proposal itself signals that something is wrong — an attacker has a window to exploit before the fix is in place.</p><p>The Security Council guard changes this dynamic. Once proposed, the guard provides retroactive protection: even if an attacker submits malicious proposals during the voting period, the guard can veto those proposals after it is installed. The security council doesn’t just prevent future attacks — it can neutralize attacks that are already in flight, provided the Security Council proposal was submitted before those attack proposals.</p><p>This is why we submitted a single proposal containing both the guard installation and a timelock, rather than a multi-proposal sequence. And this is why we prepared all communication artifacts in advance and released them simultaneously with the proposal: we could afford to go public because the mitigation, once passed, would cover the exposure window.</p><hr><h2 id="h-the-security-council-guard" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Security Council Guard</h2><p>The <code>SecurityCouncilAzorius</code> contract implements the IGuard interface from the Zodiac framework. When installed on the Azorius governance module via <code>setGuard()</code>, it interposes on every proposal transaction at execution time.</p><p><strong>How it works:</strong></p><ol><li><p>A proposal passes the voting period and enters the timelock window (2 days, added by the same proposal that installs the guard).</p></li><li><p>When someone attempts to execute the proposal, Azorius calls <code>checkTransaction()</code> on its configured guard.</p></li><li><p>The guard computes the transaction hash using <code>Azorius.getTxHash()</code> and checks it against its veto registry.</p></li><li><p>If the hash is vetoed, execution reverts with TransactionVetoed. If not, execution proceeds normally.</p></li></ol><p><strong>Council capabilities:</strong></p><ul><li><p><code>vetoProposal(proposalId)</code> — vetoes all transactions in a proposal</p></li><li><p><code>unvetoProposal(proposalId)</code> — clears veto on all transactions in a proposal</p></li><li><p><code>vetoTx(txHash)</code> / <code>unvetoTx(txHash)</code> — fine-grained control over individual transaction hashes</p></li><li><p><code>multicall(calls)</code> — batch operations atomically</p></li></ul><p><strong>Design decisions:</strong></p><ul><li><p>Veto state is stored by transaction hash, not proposal ID. This means if two proposals contain identical calldata, vetoing one blocks both. The council must enumerate active proposals before any veto action.</p></li><li><p>The council address uses OpenZeppelin Ownable. Rotation is done via <code>transferOwnership()</code> — no redeployment needed. <code>renounceOwnership()</code> is disabled to prevent accidentally leaving the guard without a council.</p></li><li><p>The guard is a veto mechanism, not a gatekeeper: it can block execution, but it cannot modify proposals or force outcomes. Voting and proposing remain fully permissionless.</p></li></ul><p><strong>Audit.</strong> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/blockful/shutter-security-council/tree/main/audits">The contract was audited</a> by <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.cyfrin.io/"><strong>Cyfrin</strong></a>. The audit returned only informational notes. All were addressed and the final version was approved.</p><div data-type="embedly" src="https://github.com/blockful/shutter-security-council/tree/main/audits" data="{&quot;provider_url&quot;:&quot;https://github.com&quot;,&quot;description&quot;:&quot;Veto guard contract for Azorius DAO proposals with council-controlled safety - shutter-security-council/audits at main · blockful/shutter-security-council&quot;,&quot;title&quot;:&quot;shutter-security-council/audits at main · blockful/shutter-security-council&quot;,&quot;author_name&quot;:&quot;blockful&quot;,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://github.com/blockful/shutter-security-council/tree/main/audits&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png&quot;,&quot;author_url&quot;:&quot;https://github.com/blockful&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;GitHub&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:600,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:1200,&quot;height&quot;:600,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://github.com/blockful/shutter-security-council/tree/main/audits" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>shutter-security-council/audits at main · blockful/shutter-security-council</h2><p>Veto guard contract for Azorius DAO proposals with council-controlled safety - shutter-security-council/audits at main · blockful/shutter-security-council</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://github.com</span></div><img src="https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png" alt="shutter-security-council/audits at main · blockful/shutter-security-council"></div></a></div></div><hr><h2 id="h-coordinated-mitigation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Coordinated Mitigation</h2><p>With the guard contract <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://github.com/blockful/shutter-security-council">developed</a>, audited, and ready for deployment, we prepared the full execution sequence.</p><div data-type="embedly" src="https://github.com/blockful/shutter-security-council" data="{&quot;provider_url&quot;:&quot;https://github.com&quot;,&quot;description&quot;:&quot;Veto guard contract for Azorius DAO proposals with council-controlled safety - blockful/shutter-security-council&quot;,&quot;title&quot;:&quot;GitHub - blockful/shutter-security-council: Veto guard contract for Azorius DAO proposals with council-controlled safety&quot;,&quot;author_name&quot;:&quot;blockful&quot;,&quot;thumbnail_width&quot;:1200,&quot;url&quot;:&quot;https://github.com/blockful/shutter-security-council&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png&quot;,&quot;author_url&quot;:&quot;https://github.com/blockful&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;GitHub&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:600,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAQCAIAAAD4YuoOAAAACXBIWXMAAAsTAAALEwEAmpwYAAAC9UlEQVR4nJ1US2sTURS+WEEXbhQUxY24KCaNLlyJVBDRVkTwB7iuUNBFoFqEio+KUPDRha+NlmoRai2V0kdqyPQmmbzbJE2TJs0kbZqknRhpO+mEG28zmZHMTfMyleDHYebMued9zh0gyRBqAWNcxdRUkP4JUFMqCLkyXqilUNOviDFGCJWf5gMghCwWi9VmC4fDBqNxSqt1ulwez/yHj30azZTdbu9++mxKq/X5fE6XaxpCg5EOBBaHvg2/fvM2yDAIIUmSNjc3QszCxi92Yz0RjYSiK+FSAJ7nux48bLvVrlZ3tN++c/deZ+f9rhevegHY26g83ahQARnPX/Reab0KADhy7HijQnXxUgsAQK3uII4S7Oqcy9p84SxoAMNDA0shP6kjH0AQBJPZPDLynaTf1//58ZNu0ihxl25gjCVJWmNZjuOIZBtnenoekVSaVCejkVApAEKZyy2thw4fVTadOXe+ef+Bg9eu3yBehPogSVKaT30d7CcBlKoTm+sJkkTFkMuTrbInqKpGFERZIsotigUDnvfvXra13fTPzwYD3ry0GMBAm6eh3mS2QEg7XW7HzCwF9Vabw253eDxeHQUhpK02+4RGS5utOgrqKDg+qTXQ5pHRsVg8TjYlwa6m+S1JEpOJtRS3TjwXZuB0uSmop6DeMTMLIf1DS01o8vajY5M6CvIFpJEMjktxXCq1tUWklSXmqqosVPAzmVxZibJsIikzy5HociQSj6+Gl5YZpjCu/0Pti1YFoXoSuXpMKgL8vRUYb2O8XfyU31nCFLer3gowxiazlWGYoo0gCAYjbTJbyC0NMsw01AcCi2T3ZT6wS+L54nx+ZmBwtBAgg1Ca51Mc51/wWywWmjZ5Pd5MfiVYt9ttok0Jlk3zfCwaGx/XsCxLjiA0BAPBLMYZhMoJIZQTsnOehU9fhtM8j1Cm8h6I4u+sQPY3v+Y7VDwt8fIlr6tFSlCgpj0yNeSfSgAUO8KSQkO1cvGzihQAnAJA/oXt+wNOk/1lTjCBqQAAAABJRU5ErkJggg==&quot;,&quot;img&quot;:{&quot;width&quot;:1200,&quot;height&quot;:600,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://github.com/blockful/shutter-security-council" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>GitHub - blockful/shutter-security-council: Veto guard contract for Azorius DAO proposals with council-controlled safety</h2><p>Veto guard contract for Azorius DAO proposals with council-controlled safety - blockful/shutter-security-council</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://github.com</span></div><img src="https://storage.googleapis.com/papyrus_images/dbf3875dd59000b63f64b54062a936859c921c5438296d164b76bba6931dc638.png" alt="GitHub - blockful/shutter-security-council: Veto guard contract for Azorius DAO proposals with council-controlled safety"></div></a></div></div><p><strong>Preparation (before going public):</strong></p><ol><li><p>Deploy a placeholder 1-of-1 Safe as the initial council address.</p></li><li><p>Deploy <code>SecurityCouncilAzorius</code> with the council Safe and Azorius module as constructor arguments.</p></li><li><p>Verify the contract on Etherscan.</p></li><li><p>Prepare the governance proposal, forum post, delegate messages, and public communications.</p></li></ol><p><strong>Execution (simultaneous):</strong></p><ol><li><p>Submit the Security Council proposal on Decent. The proposal contains two atomic transactions:</p></li></ol><ul><li><p><code>Azorius.updateTimelockPeriod(14400)</code> — introduces a 2-day timelock (~14,400 blocks at ~12s/block)</p></li><li><p><code>Azorius.setGuard(guardAddress)</code> — installs the Security Council guard</p></li></ul><ol start="2"><li><p>Publish the forum post with a high-level description of the vulnerability, the mitigation plan, and the recommendation.</p></li><li><p>Send private messages to target delegates with full vulnerability details and council participation requests.</p></li></ol><p><strong>Council formation (during voting period):</strong></p><ol><li><p>Collect confirmed addresses from delegates who agree to participate.</p></li><li><p>Upgrade the placeholder Safe from 1-of-1 to the full council multisig with appropriate threshold.</p></li><li><p>Verify multisig configuration.</p></li></ol><h3 id="h-post-execution" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Post-execution:</strong></h3><p>Once the proposal passes voting and the timelock elapses, the guard is installed and active. From that point, the council can veto any malicious proposal, including any that were submitted during the voting period.</p><p><strong>The stakeholder group coordinating the mitigation:</strong></p><table style="min-width: 50px"><colgroup><col><col></colgroup><tbody><tr><td colspan="1" rowspan="1"><p>Delegate</p></td><td colspan="1" rowspan="1"><p>Address</p></td></tr><tr><td colspan="1" rowspan="1"><p>Kleros Labs</p></td><td colspan="1" rowspan="1"><p>0xffFA76e332cA7afaae3931cb5d513B7fd681C4CF</p></td></tr><tr><td colspan="1" rowspan="1"><p>5pence</p></td><td colspan="1" rowspan="1"><p>0xe52C39327FF7576bAEc3DBFeF0787bd62dB6d726</p></td></tr><tr><td colspan="1" rowspan="1"><p>d0z3y</p></td><td colspan="1" rowspan="1"><p>0xDffDb9BeeA2aB3151BcBcf37a01EE8726F22ed94</p></td></tr><tr><td colspan="1" rowspan="1"><p>Mikko Ohtamaa</p></td><td colspan="1" rowspan="1"><p>0x61C2dAE896f93e5f0f10425914CE7868eE8A0e44</p></td></tr><tr><td colspan="1" rowspan="1"><p>Jacob Czepluch</p></td><td colspan="1" rowspan="1"><p>0x06c2c4dB3776D500636DE63e4F109386dCBa6Ae2</p></td></tr><tr><td colspan="1" rowspan="1"><p>blockful</p></td><td colspan="1" rowspan="1"><p>0x1F3D3A7A9c548bE39539b39D7400302753E20591</p></td></tr><tr><td colspan="1" rowspan="1"><p>Lanski</p></td><td colspan="1" rowspan="1"><p>0xB6647e02AE6Dd74137cB80b1C24333852E4AF890</p></td></tr><tr><td colspan="1" rowspan="1"><p>DAOplomats</p></td><td colspan="1" rowspan="1"><p>0x057928bc52bD08e4D7cE24bF47E01cE99E074048</p></td></tr></tbody></table><hr><h2 id="h-governance-parameters-before-and-after" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Governance Parameters: Before and After</h2><p>The Security Council proposal changes two parameters and leaves voting mechanics untouched.</p><table style="min-width: 75px"><colgroup><col><col><col></colgroup><tbody><tr><th colspan="1" rowspan="1"><p><strong>Parameter</strong></p></th><th colspan="1" rowspan="1"><p><strong>Before</strong></p></th><th colspan="1" rowspan="1"><p><strong>After</strong></p></th></tr><tr><td colspan="1" rowspan="1"><p>Timelock</p></td><td colspan="1" rowspan="1"><p>0 blocks (none)</p></td><td colspan="1" rowspan="1"><p>~2 days (14,400 blocks)</p></td></tr><tr><td colspan="1" rowspan="1"><p>Guard</p></td><td colspan="1" rowspan="1"><p>None</p></td><td colspan="1" rowspan="1"><p>SecurityCouncilAzorius</p></td></tr><tr><td colspan="1" rowspan="1"><p>Voting period</p></td><td colspan="1" rowspan="1"><p>~3 days (21,600 blocks)</p></td><td colspan="1" rowspan="1"><p>Unchanged</p></td></tr><tr><td colspan="1" rowspan="1"><p>Execution window</p></td><td colspan="1" rowspan="1"><p>~3 days (21,600 blocks)</p></td><td colspan="1" rowspan="1"><p>Unchanged</p></td></tr><tr><td colspan="1" rowspan="1"><p>Proposal threshold</p></td><td colspan="1" rowspan="1"><p>1 SHU</p></td><td colspan="1" rowspan="1"><p>Unchanged</p></td></tr><tr><td colspan="1" rowspan="1"><p>Quorum</p></td><td colspan="1" rowspan="1"><p>3% of total supply</p></td><td colspan="1" rowspan="1"><p>Unchanged</p></td></tr></tbody></table><p>Before the Security Council proposal, a passed proposal could be executed the instant voting ended. No review window. No safety net.</p><p>The 2-day timelock creates a window between a proposal passing and becoming executable. This window adds more time for the security council reviewing the proposal and veto if necessary. The guard enforces the veto at execution time.</p><p>The proposal threshold and other voting parameters remain unchanged in this proposal. Hardening those parameters (raising the proposer threshold, extending the execution window) is recommended as a follow-up through normal governance, now that the council provides a safety net during the transition.</p><hr><h2 id="h-trade-offs-and-temporary-centralization" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Trade-offs and Temporary Centralization</h2><p>This is a centralizing solution. A small group of delegates holds veto power over governance execution while the DAO is stabilized. We are not framing this as anything other than what it is: a necessary tradeoff to protect the treasury and allow proper governance upgrades to be discussed in the open.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/afb60c06868b6a94a19a9e9c7f96650230ff34c6a2c32313e7188e552762aa88.png" blurdataurl="data:image/png;base64,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" nextheight="1228" nextwidth="2798" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/shu/risk-analysis"><strong>Click to check Shutter data on Anticapture</strong></a></figcaption></figure><p>The alternative was leaving the DAO economically exposed with a validated attack path and a ROI exceeding 30x. Emergency response differs from permanent architecture.</p><h3 id="h-what-the-council-can-do" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="check_mark_button" class="emoji" data-type="emoji">✅</span><strong> What the council can do:</strong> </h3><ul><li><p>Veto any proposal before execution</p></li><li><p>Unveto proposals that were incorrectly blocked</p></li></ul><h3 id="h-what-the-council-cannot-do" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><span data-name="cross_mark" class="emoji" data-type="emoji">❌</span><strong> What the council cannot do:</strong> </h3><ul><li><p>Submit proposals (unless they separately hold voting power)</p></li><li><p>Modify proposal outcomes or vote counts</p></li><li><p>Change governance parameters unilaterally</p></li><li><p>Access treasury funds directly</p></li></ul><p><strong>On council removal:</strong> The guard can be removed through a governance proposal calling <code>Azorius.setGuard(address(0))</code>. However, this removal is itself subject to the council’s veto authority — the council could veto a proposal to remove itself. There are no Safe managers beyond the Azorius module that could bypass this. This is the fundamental trust assumption: the council members are selected for their alignment with the protocol, their reputation in the ecosystem, and their demonstrated commitment to Shutter’s mission. The centralization is real, and the community’s recourse is the accountability and reputation of the individuals holding these seats.</p><hr><h2 id="h-responsible-disclosure" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Responsible Disclosure</h2><p>Following our security agenda, we disclosed publicly only after the mitigation was in the governance pipeline and structured to survive the disclosure itself. Publishing vulnerability details before neutralization would have advertised the attack vector to adversarial actors and created a race condition between coordination and exploitation.</p><h4 id="h-the-disclosure-sequence-was-deliberate" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>The disclosure sequence was deliberate:</strong></h4><ol><li><p><strong>Before proposal:</strong> No public communication. All coordination was private with the stakeholder group and select counsel.</p></li><li><p><strong>At proposal submission:</strong> <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://shutternetwork.discourse.group/t/security-emergency-governance-hardening-attack-prevention/804">Forum post</a> and delegate messages released simultaneously. High-level vulnerability description without step-by-step exploit instructions.</p><div data-type="embedly" src="https://shutternetwork.discourse.group/t/security-emergency-governance-hardening-attack-prevention/804" data="{&quot;provider_url&quot;:&quot;https://shutternetwork.discourse.group&quot;,&quot;description&quot;:&quot;TL;DR Shutter DAO (0x36) has a governance vulnerability where the cost to attack the DAO (approximately $100K to reach quorum) is significantly lower than the treasury value ($3M+). The current configuration allows any address holding 1 SHU to submit unlimited proposals with zero timelock, creating an asymmetric attack surface: an attacker needs only ONE proposal to pass, while defenders must vote NO on every malicious proposal.&quot;,&quot;title&quot;:&quot;[SECURITY] Emergency Governance Hardening - Attack Prevention&quot;,&quot;author_name&quot;:&quot;blockful&quot;,&quot;thumbnail_width&quot;:1201,&quot;url&quot;:&quot;https://shutternetwork.discourse.group/t/security-emergency-governance-hardening-attack-prevention/804&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/4081345e67a78eebbf55423c8a775fade9da5e4ef33402528efb87344c0d7e55.png&quot;,&quot;author_url&quot;:&quot;https://shutternetwork.discourse.group/u/blockful&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Shutter Forum&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:631,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:1201,&quot;height&quot;:631,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/4081345e67a78eebbf55423c8a775fade9da5e4ef33402528efb87344c0d7e55.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/4081345e67a78eebbf55423c8a775fade9da5e4ef33402528efb87344c0d7e55.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://shutternetwork.discourse.group/t/security-emergency-governance-hardening-attack-prevention/804" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>[SECURITY] Emergency Governance Hardening - Attack Prevention</h2><p>TL;DR Shutter DAO (0x36) has a governance vulnerability where the cost to attack the DAO (approximately $100K to reach quorum) is significantly lower than the treasury value ($3M+). The current configuration allows any address holding 1 SHU to submit unlimited proposals with zero timelock, creating an asymmetric attack surface: an attacker needs only ONE proposal to pass, while defenders must vote NO on every malicious proposal.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://shutternetwork.discourse.group</span></div><img src="https://storage.googleapis.com/papyrus_images/4081345e67a78eebbf55423c8a775fade9da5e4ef33402528efb87344c0d7e55.png" alt="[SECURITY] Emergency Governance Hardening - Attack Prevention"></div></a></div></div></li><li><p><strong>After execution:</strong> Full technical disclosure. Safe to publish because the guard is active and can veto any attack submitted after the vulnerability became public knowledge.</p></li></ol><p>Exceptions were made for counsel on how to proceed: Loring Harkness from Brainbot, who provided Shutter-specific protocol context.</p><hr><h2 id="h-long-term-improvements" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Long-Term Improvements</h2><p>After neutralizing the acute risk, we recommend the community explore:</p><ul><li><p><strong>Proposal threshold increase.</strong> Raising the required proposer weight from 1 SHU to a meaningful amount (e.g., 100,000 SHU, 0.01% of supply) eliminates spam while remaining accessible to serious participants. Based on delegated voting power, not token balance.</p></li><li><p><strong>Execution window extension.</strong> With the 2-day timelock added, extending the execution window from 3 days to 7 days gives legitimate proposers sufficient time to execute without risk of proposals expiring over weekends or holidays.</p></li><li><p><strong>Azorius module enhancements.</strong> Rate limiting on proposal creation, proposal staging windows, and time-delayed execution add defense-in-depth beyond the council’s veto capability.</p></li><li><p><strong>Broader veto mechanisms.</strong> Enabling intervention without permanent centralization of veto authority. The current council is a temporary measure; the long-term goal is governance architecture that is resilient by design, not by delegation.</p></li></ul><p>The objective is designing a resilient system while the DAO is not under active attack. Security creates the conditions for sustainable decentralization.</p><hr><p><em>This work is part of blockful’s security agenda. Our purpose is aligned with the Ethereum ecosystem: we are committed to protecting not only the funds present in it, but every piece of infrastructure that makes it what it is.</em></p><p><em>Shutter’s research on encrypted mempools and MEV protection positions it as infrastructure-grade technology within the Ethereum ecosystem. Governance vulnerabilities represent structural risks requiring systematic identification, quantification, and mitigation.</em></p><p><em>This pattern repeats across protocol lifecycles: governance designs adequate at one treasury scale fail at another.</em></p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/f5ce7479ef20155c9876793093b990abcaa0e4441deb43ad44b0432e1589b02b.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Q: How Aave Labs Will Approve “Aave Will Win” Proposal? ]]></title>
            <link>https://paragraph.com/@blockful/aave-will-win</link>
            <guid>AVyBJcTi2i9Czy0mbB5l</guid>
            <pubDate>Mon, 02 Mar 2026 21:52:37 GMT</pubDate>
            <description><![CDATA["I have been in every room in the house, I have frightened the housekeeper into hysterics, I have assumed various disguises, and yet all my efforts have been in vain. I am the ghost of this house, and I shall remain so." – From Oscar Wilde's The Canterville GhostThe Canterville GhostThis week, one of the most relevant proposals for the ecosystem went to a vote: Aave Will Win. If approved, it will pay $47.5M and 75,000 $AAVE to Aave Labs to continue the development and launch of Aave v4, route...]]></description>
            <content:encoded><![CDATA[<blockquote><p><em>"I have been in every room in the house, I have frightened the housekeeper into hysterics, I have assumed various disguises, and yet all my efforts have been in vain. I am the ghost of this house, and I shall remain so."</em><strong><em> – </em>From Oscar Wilde's <em>The Canterville Ghost</em></strong></p></blockquote><figure float="none" width="447px" data-type="figure" class="img-center" style="max-width: 447px;"><img src="https://storage.googleapis.com/papyrus_images/80ad4bc31783391a6089eb8834c661e4381e11841ce843e42168cbfc85d2c1c7.png" blurdataurl="data:image/png;base64,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" nextheight="700" nextwidth="700" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><strong><em>The Canterville Ghost</em></strong></figcaption></figure><p><strong>This week, one of the most relevant proposals for the ecosystem went to a vote: </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/temp-check-aave-will-win-framework/24055"><strong>Aave Will Win</strong></a><strong>. If approved, it will pay $47.5M and 75,000 $AAVE to Aave Labs to continue the development and launch of Aave v4, routes all Aave-branded product revenue to treasury, and approves brand-protection plan.</strong></p><div data-type="embedly" src="https://governance.aave.com/t/temp-check-aave-will-win-framework/24055" data="{&quot;provider_url&quot;:&quot;https://governance.aave.com&quot;,&quot;description&quot;:&quot;1. Summary Aave began with the thesis that decentralized lending could play a major role in traditional finance. Eight years later, that thesis has been validated. Aave is the largest protocol in decentralized finance, commanding a 60% market share in lending. The opportunity ahead, however, is bigger than anything behind us.&quot;,&quot;title&quot;:&quot;[TEMP CHECK] Aave Will Win Framework&quot;,&quot;author_name&quot;:&quot;AaveLabs&quot;,&quot;thumbnail_width&quot;:1024,&quot;url&quot;:&quot;https://governance.aave.com/t/temp-check-aave-will-win-framework/24055&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/900e0f5bcb6ef95e9924bfb23938f0e5b4aab73698f4541b8b6864c7d3a2816c.jpg&quot;,&quot;author_url&quot;:&quot;https://governance.aave.com/u/AaveLabs&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Aave&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:576,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:1024,&quot;height&quot;:576,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/900e0f5bcb6ef95e9924bfb23938f0e5b4aab73698f4541b8b6864c7d3a2816c.jpg&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/900e0f5bcb6ef95e9924bfb23938f0e5b4aab73698f4541b8b6864c7d3a2816c.jpg"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://governance.aave.com/t/temp-check-aave-will-win-framework/24055" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>[TEMP CHECK] Aave Will Win Framework</h2><p>1. Summary Aave began with the thesis that decentralized lending could play a major role in traditional finance. Eight years later, that thesis has been validated. Aave is the largest protocol in decentralized finance, commanding a 60% market share in lending. The opportunity ahead, however, is bigger than anything behind us.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://governance.aave.com</span></div><img src="https://storage.googleapis.com/papyrus_images/900e0f5bcb6ef95e9924bfb23938f0e5b4aab73698f4541b8b6864c7d3a2816c.jpg" alt="[TEMP CHECK] Aave Will Win Framework"></div></a></div></div><p><strong>Its relevance is not only due to the amount of money allocated to Aave Labs, which represents 30% of the treasury. The Aave DAO community is, for the most part, against the proposal.</strong></p><p><strong>Since the beginning of the proposal’s discussion, the Aave Chan Initiative — led by Marc Zeller — </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/aave-labs-86-million-23-of-the-token-supply-and-this-is-their-track-record/24159"><strong>has positioned itself against it.</strong></a><strong> BGD Labs, a service provider for more than four years within the Aave DAO, </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/bgd-leaving-aave/24122"><strong>has decided to stop working with Aave</strong></a><strong>.</strong></p><div data-type="embedly" src="https://governance.aave.com/t/bgd-leaving-aave/24122" data="{&quot;provider_url&quot;:&quot;https://governance.aave.com&quot;,&quot;description&quot;:&quot;Simple summary We would like to inform the community with sufficient time in advance that, once our current engagement for services with the Aave DAO will conclude on April 1st, 2026, we will not be seeking a renewal and will cease our contribution to Aave.&quot;,&quot;title&quot;:&quot;BGD. Leaving Aave&quot;,&quot;author_name&quot;:&quot;bgdlabs&quot;,&quot;thumbnail_width&quot;:800,&quot;url&quot;:&quot;https://governance.aave.com/t/bgd-leaving-aave/24122&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/3e30be518643160007876fbfa38c227afd60515d057cb8b79869587d836c6ca8.png&quot;,&quot;author_url&quot;:&quot;https://governance.aave.com/u/bgdlabs&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Aave&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:512,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:800,&quot;height&quot;:512,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/3e30be518643160007876fbfa38c227afd60515d057cb8b79869587d836c6ca8.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/3e30be518643160007876fbfa38c227afd60515d057cb8b79869587d836c6ca8.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://governance.aave.com/t/bgd-leaving-aave/24122" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>BGD. Leaving Aave</h2><p>Simple summary We would like to inform the community with sufficient time in advance that, once our current engagement for services with the Aave DAO will conclude on April 1st, 2026, we will not be seeking a renewal and will cease our contribution to Aave.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://governance.aave.com</span></div><img src="https://storage.googleapis.com/papyrus_images/3e30be518643160007876fbfa38c227afd60515d057cb8b79869587d836c6ca8.png" alt="BGD. Leaving Aave"></div></a></div></div><hr><h2 id="h-the-conflict" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Conflict</strong></h2><p><strong>There is clearly a conflict between Aave Labs and the DAO. This clash has been going on for months.</strong></p><p><strong>It began back in 2025, </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/aave-cowswap-integration-tokenholder-questions/23530"><strong>when Ezr3al — an Aave delegate — discovered that one of Aave DAO’s revenue sources</strong></a><strong> had ceased to exist due to a modification made by Aave Labs to Aave’s front-end.</strong></p><p><strong>Since then, Aave governance has turned into a stage for a power struggle between Stani, Aave Labs, and the Aave DAO.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/13c79c4ae105f1a17d007ab238caaa621fd7ad2fde2df4a0acf33924d1152418.png" blurdataurl="data:image/png;base64,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" nextheight="639" nextwidth="1188" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><strong>On February 3, ACI submitted a </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/arfc-addendum-mandatory-disclosures-and-conflict-of-interest-voting-norms/23995"><strong>proposal to improve transparency and prevent conflicts of interest within the Aave DAO.</strong></a></p><p><strong>Its objective was to require active governance participants to disclose their addresses and available voting power, as well as to prohibit individuals from using their votes to approve proposals that directly benefit themselves — in such cases, they would be required to abstain.</strong></p><p><strong>The proposal had specific targets: Stani Kulechov and Aave Labs.</strong></p><p><strong>After the approval of the proposal that kept the “Aave” brand under the control of Aave Labs, ACI and several delegates already knew that Aave Labs would submit a proposal requesting a budget to launch Aave v4.</strong></p><p><strong>Their concern was that old wallets would be used to vote in favor of their proposal — just as they did in the proposal that kept the brand under Aave Labs’ control.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/379215bb96d3a639517a45137dd55fbad1c80179a64f76ac86ff2a775bbd0389.png" blurdataurl="data:image/png;base64,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" nextheight="506" nextwidth="1033" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><hr><h2 id="h-haunted" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Haunted</strong></h2><p><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/arfc-addendum-mandatory-disclosures-and-conflict-of-interest-voting-norms/23995/24"><strong>Stani</strong></a><strong> and </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://governance.aave.com/t/arfc-addendum-mandatory-disclosures-and-conflict-of-interest-voting-norms/23995/9"><strong>multiple</strong></a><strong> members of Aave Labs opposed the proposal aimed at improving transparency and conflict-of-interest guidelines within the DAO. They argued that such measures could create confusion and friction in governance.</strong></p><p><strong>Stani also stated: “The whole point of token governance is to enable participation with tokens one owns, with full sovereignty.”</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a87a8d729b194341fe794f1c3a6137d4796026c232e0d81e778df7779f1e3b3b.png" blurdataurl="data:image/png;base64,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" nextheight="778" nextwidth="975" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><h3 id="h-the-proposal-went-to-a-vote-on-snapshot-and-was-not-approved" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>The proposal </strong><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://snapshot.box/#/s:aavedao.eth/proposal/0xc115a21b8762ede9a4af7421cb66e23fc73982b686706e8c5d858c0b21c53470"><strong>went to a vote on Snapshot and was not approved.</strong></a></h3><p><strong>According to an analysis conducted by Marc Zeller from ACI, 99% of the votes against the proposal were linked to Stani Kulechov and Aave Labs.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/8f85e8dcfec980db325700e6314709ead8c7897b195b999b3478517df741ee0a.png" blurdataurl="data:image/png;base64,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" nextheight="889" nextwidth="1146" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><h3 id="h-on-the-same-day-as-zellers-analysis-aave-labs-submitted-the-aave-will-win-proposal-to-the-aave-dao-forum" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>On the same day as Zeller’s analysis, Aave Labs submitted the “Aave Will Win” proposal to the Aave DAO forum.</strong></h3><p><strong>In addition to a strategy to share revenue with the DAO and structure a Foundation controlled by the DAO to maintain the “Aave” brand, Aave Labs requested a budget of $47.5M in stablecoins and 75,000 $AAVE — equivalent to 30% of the DAO’s treasury.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6e73b652aac06dcc64c3459c5e668638861482fc975e466988a9931226630d40.png" blurdataurl="data:image/png;base64,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" nextheight="371" nextwidth="600" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><h3 id="h-the-proposal-ended-on-saturday-with-622k-yes-and-497k-no" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://snapshot.box/#/s:aavedao.eth/proposal/0x46d78018f1204e2337ee77edc13753869cc90163fe46a23698f67f4a98365acc"><strong>The proposal ended on Saturday</strong></a><strong>, with 622K YES and 497K NO.</strong></h3><p>Given Aave Labs' and Stani's behavior, we analyzed the addresses used in the proposal, as well as other wallets holding Aave governance tokens.</p><p>The analyzed addresses can be found <a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://docs.google.com/spreadsheets/d/1mpC5MMLhuXjDnxGn0nY5D1XeXtRBxAxOc3P10MoKuag/edit?usp=sharing">in this spreadsheet</a>. All information regarding voting power was obtained through <a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="https://dune.com/queries/6738591">this query.</a></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/58fbc9b194a3caeb722afbbecdb292d48ed6270223f7ff97e594a7b154ac52e8.png" blurdataurl="data:image/png;base64,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" nextheight="520" nextwidth="1600" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Most of the votes in favor (600K $AAVE) come from five addresses:</p><ul><li><p>0x7F4a59b7517233F0b54f26cb9FDc5587A88cd1E1: ParaFi Capital — 190K</p></li><li><p>0x2079C29Be9c8095042edB95f293B5b510203d6cE: luggis.eth — 123.6K</p></li><li><p>Areta: an address that received delegations from Stani Kulechov — 75.8K</p></li><li><p>0xdC0990910F47aD479020eD77B0d62BF738C2791a: an address with connections to Stani Kulechov’s wallet — 111K</p></li><li><p>0x388cd8A0a0e05B50307FEC7F3Ef1e8893E0b70cC: connections with Aave Team Multisig — 47.1K.</p></li></ul><hr><h2 id="h-the-control" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Control</h2><p>According to the addresses mapped in the research, Stani Kulechov and Aave Labs still control over 300,000 $AAVE across wallets under their control, which could be used to approve the proposal once it goes for onchain vote.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/4ebb55f44dab504af0583596eaa04da0643ab27047617a914f69b2b2871487a2.png" blurdataurl="data:image/png;base64,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" nextheight="603" nextwidth="977" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>The votes are controlled by 9 different addresses, with particular emphasis on:</p><ul><li><p>0xEA0C12Fd29c3fe5B1ecC82a42702196bd0De6B5A — 333,000 $AAVE and voted against the proposal to transfer the Aave brand from Aave Labs to the Aave DAO — identified as “Stani” by Nansen.</p></li><li><p>0x47ca539b3f546078d97bd851130741c6bf370100 — 84,032 $AAVE and identified as “Stani” by Nansen.</p></li><li><p>0x58ddfb3db792d2f8e2cdd5ba9726e6b932a3f5af — 40,879 $AAVE and receives delegations from an address identified as “Stani” on Nansen.</p></li></ul><p>None of these addresses was used in the latest vote.</p><p>Beyond the clearer connections mentioned above, there are also addresses linked to wallets labeled as “Aave Genesis Team” and responsible for acting in Aave multisigs.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b1155fbca1e82a61a349cf541d89c8d1e75a98ffc979ce062956316d90fd0b9a.png" blurdataurl="data:image/png;base64,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" nextheight="572" nextwidth="926" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>We also identified 13 addresses holding 276,610 $AAVE that received large allocations in the last months and have shown no on-chain activity beyond the initial transfers. Only one address holds stkAAVE, the staked version of the Aave DAO governance token.</p><p>One pattern we found is that 10 of the 13 addresses received transfers ranging between 14K and 39K $AAVE over the past two months. All transfers originated from Coinbase or Coinbase Prime.</p><h3 id="h-none-of-the-13-addresses-has-direct-connections-to-stani-kulechov-or-aave-labs" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>None of the 13 addresses has direct connections to Stani Kulechov or Aave Labs.</strong></h3><p>However, this is common behavior when voters seek to increase their voting power without being tracked: <strong>acquiring tokens on a CEX and transferring them to previously unused addresses.</strong></p><p>We expect to see many of these addresses, as well as others not identified in our analysis, being used to vote in favor of the on-chain proposal in case opposition gets above what is was on the Snapshot vote.</p><hr><h2 id="h-the-ghost" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The Ghost</h2><p>Aave is one of the most important DAOs on Ethereum. The lack of visibility on voting powers, their distribution, and coalitions, really shows at moments like this. </p><p>We are working our way into getting Aave data available at <a target="_blank" rel="noopener noreferrer" class="dont-break-out ql-link" href="http://anticapture.com">anticapture.com</a> as soon as possible, so everyone can see where the power to choose how "Aave will win" sits.</p><br><br>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/cba44ddab0a537326d546bdd3c29567a5f2bb4ae82d3a0f3fe904d0c197605d2.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[SporkDAO's 2026 Board Election: A Governance Security Analysis]]></title>
            <link>https://paragraph.com/@blockful/sporkdaos-2026-board-election</link>
            <guid>tjfOjIeHskUBfQwxvBLA</guid>
            <pubDate>Sun, 01 Mar 2026 15:54:55 GMT</pubDate>
            <description><![CDATA[SporkDAO's board election was stress-tested. Here's why off-chain governance needs a security layer.]]></description>
            <content:encoded><![CDATA[<p>Bruce Schneier coined the term Security Theater to describe security measures that provide the feeling of safety without meaningfully delivering it. The canonical example is a guard booth at a parking lot: visible, reassuring, present... and bypassed by anyone who walks in through the side entrance. SporkDAO built a guard booth. </p><blockquote><p><em>Many procedures of the TSA have been criticized as security theater. Specific measures critiqued as security theater include the "patting down the crotches of children, the elderly and even infants as part of the post-9/11 airport security show" and the use of </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://en.wikipedia.org/wiki/Full_body_scanner"><em>full body scanners</em></a><em>, which "are ineffective and can be easily manipulated."</em></p></blockquote><p>Someone walked in through the side. The election results were not altered. But the entrance is still there.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/fb72f33ad5e1688681d15da2cbfb7cd77e6255bb827a0e84e9a579d05c98640f.png" blurdataurl="data:image/png;base64,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" nextheight="1474" nextwidth="2794" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://snapshot.box/#/s:sporkdao.eth/proposal/0xfc2ba2b8841d2e2de9ea3072f6f2b5d53ff02281ed72a3dfbe5aca7e4a9b4218">Source: Snapshot</a></figcaption></figure><hr><h2 id="h-sporkdao-is-worth-understanding-carefully" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>SporkDAO Is Worth Understanding Carefully</strong></h2><p>SporkDAO is a Colorado Limited Cooperative Association: the first legally recognized DAO in the United States. When Governor Jared Polis announced Colorado's ambition to become the "First Digital State" in 2021, SporkDAO was the operational proof that the model could work. It set a precedent that continues to shape how US legislators and regulators approach DAOs.</p><p>Its operating asset is ETHDenver, the largest and most sustained Ethereum-aligned gathering in the US. Over 100,000 participants from 140+ countries. Tens of millions of dollars mobilized annually through sponsorships, grants, and ecosystem investment. A hackathon infrastructure that has seeded projects now operating at serious scale. There is no comparable event in the United States in terms of Ethereum alignment, community ownership, and cultural density.</p><div data-type="embedly" src="https://abcnews.com/ABCNews/colorado-state-accept-cryptocurrency-payment-taxes/story?id=83066842" data="{&quot;provider_url&quot;:&quot;https://abcnews.com&quot;,&quot;description&quot;:&quot;Colorado is set to become the first state to accept cryptocurrency as payment for state taxes and fees&quot;,&quot;title&quot;:&quot;Colorado to become the first state to accept cryptocurrency as payment for taxes&quot;,&quot;author_name&quot;:&quot;ABC News&quot;,&quot;url&quot;:&quot;https://abcnews.com/ABCNews/colorado-state-accept-cryptocurrency-payment-taxes/story?id=83066842&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/b53cdfe5b021129e46e503432320e088abaf9384b56bf46761babd14ab9474e8.jpg&quot;,&quot;thumbnail_width&quot;:992,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;ABC News&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:558,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAASCAIAAAC1qksFAAAACXBIWXMAAAsTAAALEwEAmpwYAAAGZ0lEQVR4nJ2QaVCTVxiFvy+bBBBIwhogBEJYIhCWIGFLgBTIToKCQQ1iqlAoioRNaUSwQoBWWSoyNdSFoCIWKREViiDGRG1RSpVSFSgUcQEUKaRVWuvXAdt/7Z+eeebOvOfOec+dCwD/V3AQZm6ENoLDVyZwhX/Tv9ow2H/uBcHlhAMGp8ku7N/zSRGDG2rngFo2l33w3QmHwxHvigHAFAQQMABcYfkOBqDRgJkJiEQBCAQAR66A+BsYAkQgl5OXcguhbt2rU636NHkGnWmMQsDAZQEgcqUFDoL/FODQcDM0YLQKQBsBpiagjSXS3g5lY7UKizPG4kyxOFMLjPE7MDgTDM7U1NzI3g43c/b87xf7Fls7hkpKMiMibHAWZsZIGByGQqMRKAQchYIhjf7+BzssEmsBYixAaxyc6GC0xt2CQl7tQljtSDAnOGGcnHBEJ0uik9UyRFuSC94Gj5ELhTM1tQ8b1AutmodVn6RHhVLIeBwWbWFhbG2DsbQyw1quxlqaoU1QSCQIEG1N7KxReNtVLgRjCtkswNuK6omhuGEp7tYUT1tvip2vj4Ovj72vj6Mf1TmA6kylOmsrKufrjkL6PuiyZuRQ6S5BWFECn+3nSiRaeHg4urriSSRbogve1ma1lZUJ4EYwcXFEk0mmXu7mvl6Ytb42dH/rtQG2dJpDyFpCaLAzI8yVwSAzGW5RER5MpruQGzh85LO3Fzuh29+8OH9m4ODeko3RusK8/RI+lYZnhnqEBJGDaK6B/s4erlZkEg5YQzankM38vbCBVOtgmh0zlMAMcWSGEplMl8gIcgzLncv24nN94gR+YlGgQOC3Yytn9uypN1e7f9P2/Hi86tvDxSr55s93bYnn+Qj5fgIelcOmxrC8WRGewTSHYJojEOCNo/nggmn4sLX4KAaBG+McG+3MjnKPjfHkcbziBL7rxAEJ62mJkqDNm8MkSfSCnaK3/bqXfRcnOpsHzlTrGvYfyGDnycK2bY1MlkZskoQlJYQkrKPHiwLZLA82yxMI9rem+1uHB9mzwp2EHFK8kBzHcxPxKOvivBPEPkmJ/skbA7dK6TJZWOo2xgepkZmZ7IYq+UDHybuXGgfbavUnP1ZVZJ9qaVHWHkzdHrU9jbVNFiHbwpBKQxPifTaIAwBmkEN4kH0kw4kT7SQWuEniKVwOkc8lxYs9pRI/2RZ62rbw9FRmZnpUVmZMbjZvZ1ZUeaX8nrZr8talJ0MDUxOzd0cNzc3dHyuyd2VxsnbEZO2IzcyITk9lbk0Okm0JBlihjlEMQjjDboPIU5bou0Hs2VZbVL5H+uluSXGOWFWampoWlrOLnSNn5xcI8/M5B8pkvb3dD4ZGx8YXxqehrt7BQ6XK018cfzgy29XXp1Cs353Pz8/ly7NiMtMZmemRQDSTwGTapycE5m4KUe9JOV2Wfbg0Y+pqh/5E2Udy3nBHY3YWa3c+V6EQFhTENKkrh8dmdLcHR6YMt4cfqRu/aDx55ruhnxaWoIXX0PD43BFVSfFeYck+kWIPvyAntiA3FuCyCLEsh50b6dUZHHWh9GmrauirYz3H9j/VXzhfnzuhPVd5QKJQCIoU3Lo6+djk9PUbXy9B0NT0/OXu873anpmXkGEJ+sUAPZx88f2DqZb24xXKjeVlSQdKRPuKuMVFAoAXS4zjkIrff6/0A5a2uuBnTeNo+9HxntMv+rvHe07omhR1lSn7ikTKskT9rb629vqnsy/HJh9dv9E7NWuY/xX67Q/o+QI0NW34cWxqeGSiufXwUVVOTVVyZXl8hTKuXCkCRDySWOAqkwQoP4y9UpM7erb2prr0Xnfj05sd97tUg5qDF07mlxTzz7Ud6dN26m9199/R9eo65wx/LkHQ3CK08AqaePLLxJP5xzMG3bfayz0tanVhg+rD2uoNNVXrqw+uAxKE5PVitx0pwcqd7C+V24eaKn5o++yHjvq7F2ruXzn+oLdhtO/otfby74fv6fW6n0Ye3bjRYVhafvjcInR/7Nnz+beLr6HF19DYo2f6O/quntNN6rwmdV59vbS+LunI4c1AYrz7pkSKNMkrJZma9n7AoSLxJVVuS01aQ5VM05g/ck39bFDzZKB16OY5TZvqzp3+hSVobvGNYQkaf/x88tn84mvoxeKb2flX44+ntbc62zWV51r2Np/JO9aQ0qBKVqmS/wKWkI/TLVjM2QAAAABJRU5ErkJggg==&quot;,&quot;img&quot;:{&quot;width&quot;:992,&quot;height&quot;:558,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/b53cdfe5b021129e46e503432320e088abaf9384b56bf46761babd14ab9474e8.jpg&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/b53cdfe5b021129e46e503432320e088abaf9384b56bf46761babd14ab9474e8.jpg"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://abcnews.com/ABCNews/colorado-state-accept-cryptocurrency-payment-taxes/story?id=83066842" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>Colorado to become the first state to accept cryptocurrency as payment for taxes</h2><p>Colorado is set to become the first state to accept cryptocurrency as payment for state taxes and fees</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://abcnews.com</span></div><img src="https://storage.googleapis.com/papyrus_images/b53cdfe5b021129e46e503432320e088abaf9384b56bf46761babd14ab9474e8.jpg" alt="Colorado to become the first state to accept cryptocurrency as payment for taxes"></div></a></div></div><p>SporkDAO's governance runs on $SPORK. Members stake tokens, and voting is quadratic, meaning that spreading votes across candidates dilutes individual power, while concentrating them amplifies it. The primary use of that mechanism is electing the Board of Stewards, the body that holds legal and operational responsibility for ETHDenver and its subsidiaries.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/182c035582cb64865b48562c4eadc86574c61231c955ad0e4ce024c9e1d81361.png" blurdataurl="data:image/png;base64,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" nextheight="546" nextwidth="2374" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://sporkdao.org/tokenomics/">Source: SporkDAO docs</a></figcaption></figure><p>In spring 2025, the Board voted to distribute $420,000 USDC to members, real economic returns to real participants in a cooperative structure. This is not symbolic governance.</p><p>The Board of Stewards holds some legal and financial responsibility for this structure, and electing that board is the primary governance function of $SPORK. Even operating through Snapshot, off-chain, without the finality guarantees of on-chain execution, the integrity of that election carries reputational and regulatory weight that extends well beyond the DAO itself. SporkDAO is one of the most structurally organized DAOs from a regulatory standpoint. How its governance functions, or fails to function, is watched.</p><hr><h2 id="h-the-design-is-right-the-enforcement-boundary-is-not" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Design Is Right. The Enforcement Boundary Is Not.</strong></h2><p>SporkDAO's approach to sybil resistance is conceptually sound. According to its tokenomics documentation, membership requires staking at least 1 $SPORK and having attended at least one of the last two ETHDenver events. Voting is quadratic, weighted by staked balance. Physical presence at ETHDenver is a meaningful constraint. It requires real-world coordination that cannot be replicated cheaply at scale by automated actors. The design correctly identifies the attack surface and applies a real-world bounded gate.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/0a0c4f256bd7954534869a9c8c2b7d33f949041cc273b9709e24f52a5ce181b2.png" blurdataurl="data:image/png;base64,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" nextheight="1474" nextwidth="2940" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://stake.sporkdao.org/">Source: SporkDAO main stake page</a></figcaption></figure><p>The issue is that this gate lives in the wrong place. SporkDAO maintains an IPFS-hosted file of verified ETHDenver attendees. When a user visits the website to stake, the site checks whether their address appears on that list. If it does not, the flow stops there. But the Snapshot voting strategy, the layer that actually calculates each voter's quadratic weight at the moment of voting, reads staked $SPORK balances from the staking contract on-chain. It does not reference the IPFS whitelist. It has no awareness of the attendance requirement. </p><p>A wallet that staked by interacting with the contract directly, through Etherscan, without ever touching the website, is indistinguishable from a verified member in the strategy's view. The frontend enforces the membership policy. The execution environment does not. This is a limitation of the Snapshot voting platform, not a weakness in SporkDAO’s secure and smart membership requirements.</p><hr><h2 id="h-what-the-data-shows" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>What the Data Shows</strong></h2><p>On February 26, 2026, between 20:46 and 20:58 UTC, some wallets each holding staked $SPORK cast votes in the Board of Stewards election. The staking amount is notable: √324 = 18, a clean quadratic weight, suggesting familiarity with SporkDAO's voting mechanics. After the election finalized it became clear: each of these 193 wallets made an intentionally invalid vote, having no effect on the outcome of the election at all.</p><p>The elected Board members, Hannah Laut (27.71%), John Paller (26.76%), and Joseph Schiarizzi (21.5%), were determined by legitimate voting power that dwarfed the cluster's footprint by orders of magnitude. The outcome was not altered. Plus, the cluster was filtered out by SporkDAO’s manual review of the membership requirements.</p><p>The behavioral signature, identical balances, compressed timing, uniform vote distribution, is consistent with automation, but the data does not establish intent or attribution beyond that, blockful analysis shows these wallets were funded by other connected wallets, and likely controlled by a single user.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/88611e3f61d245b46fb5e97ec1b73fab421ad6ef6775e5d195ec7bfd69847e0d.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAHCAIAAADmsdgtAAAACXBIWXMAABYlAAAWJQFJUiTwAAAClklEQVR4nGNgYGBICatTUbGU13PUswnWNPMVl1avrO7Iya3Mya0sKm2qrGovq2zp6p0hJqGck1s5Y/aKFau2tXVMCY9MOXDwvH9QDAMDMwODICuHuLNbYFffrIWL1zu5+WdkloVHpjAwCDIwsInqaTvKK+jJqhorqZspqpnIKuk6ufkbmtjZOng7uwV6+oTZOnhbWrtJy2qYW7m6ugc5uwWaW7kamtj5B8cZGNvyCciISShLy2po6Vr4B8WER6bo6FnaOnibW7mycogzMDDxddUuiQrLC0kojctsislo8AmMX7Fq24zZK2bMXrFs5baVq3cuWrJpy/Yjnj5hM2avOHb80oEDZ9du2NvVN+vm7Re1DT2GJnbmVq62Dt7Fpc07d524cvVBeWXrlGmLW9qn8AnIgHxgY+GrpW2tZeSga+Kia+ykom7q6RPu7BYI80G4p0+4f3CcqoaJk5t/XEJWeGSKf3CcrYN3XEKWuZWrlKymvLKevLKeuZWrf3BceGSKsam9rYO3jb0n2AIG1tiAchUVSyU9R20Lf1AcyGiWV7amZZSmZZQWlTRUVrUXFNfXN/YKiSlm5lbMmL2st392eWVrRHT6spXbXN2DGBg4IXHg4Ojf1jFt/qL19o4+6RlF4ZEp4CBiE3VxCjM0cjQwdzG29DC2dNfWs4H4AO58T58wT58wVQ0TZ7dA/+A4/6AYL99oiA9s7D3llfVUNUxUNUwsrD38g+Mg3oIEAK+ANAMDA0N/7crQwEzvqMLozObIjGZHt5AdO48sWrJp/qL1K1fv3Lnz2NoNe48dv2Tr4D1/0foHj99fufpg585jk6YsfPfhV21Dj6qGiZauhaGJXXFp89HjVx88fl9e2Tp/0fre/rnySjoAQGvsqz3YdK4AAAAASUVORK5CYII=" nextheight="308" nextwidth="1454" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><hr><h2 id="h-the-scenario-that-didnt-happen" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Scenario That Didn't Happen</strong></h2><p>The actor who executed this distributed votes evenly. That choice, whether deliberate or incidental, is what kept this a footnote rather than a crisis. At the turnout levels observed in this election, that alone would not have been sufficient to alter the outcome.</p><p>The cost of running this operation is bounded by the price of $SPORK and the effort of distributing it across addresses. There is no identity barrier in the execution path. There is no enforcement mechanism that escalates cost with scale. The ceiling is economic, not structural, and SporkDAO's governance controls assets and legal standing worth considerably more than the cost of the operation.</p><p><strong>The right question is not what this actor did. It is what the mechanism permits.</strong></p><hr><h2 id="h-how-to-close-the-gap" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How to Close the Gap</strong></h2><p>The fix is a configuration change, not a protocol redesign.</p><p>Snapshot supports combined voting strategies. The SporkDAO space strategy should be modified so that voting power is granted only to addresses that satisfy two conditions simultaneously: <strong>holding staked $SPORK above the minimum threshold, and appearing on the current membership whitelist.</strong> The IPFS whitelist already exists. It is not being consulted at the point of execution. Connecting these two layers closes the demonstrated vector before the next election cycle.</p><p>Beyond that, the IPFS whitelist carries its own operational fragility, it requires a trusted party to maintain it, pin it, and update the content hash referenced in the strategy configuration before each election. A more durable architecture involves an on-chain MemberRegistry contract, controlled by a Board multisig, updated annually following ETHDenver registration. The Snapshot strategy references the contract state at the vote snapshot block. <strong>This removes the off-chain dependency and makes membership state auditable and transparent.</strong></p><p>These are not large engineering efforts. They are configuration and deployment tasks. The gap between the stated membership policy and its enforcement in execution is a known, scoped, remediable problem.</p><hr><h2 id="h-on-observability" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>On Observability</strong></h2><p>The cluster in this election was identifiable in real time. Identical staked balances, 12-minute execution window, uniform vote distribution, this is a high-confidence behavioral signature. A monitoring system watching Snapshot vote submissions against on-chain staking activity would have flagged it while the vote was still open.</p><p>Post-hoc analysis from a CSV export is forensics, not security. The signal that matters is the one that arrives while there is still time to act.</p><p><strong>blockful is developing monitoring infrastructure for off-chain DAOs</strong>, organizations that conduct governance offchain while anchoring economic rights on-chain. As part of the next phase of the <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/">Anticapture</a> platform, this includes real-time alerting on sybil-consistent patterns, strategy configuration drift detection, and voting power anomaly signals during live governance windows. The SporkDAO 2026 election is precisely the scenario this tooling is built to surface.</p><div data-type="twitter" tweetid="2027140028007145851">
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/anticapture">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/4d10c7af205303b49a66e35093373a3a0791cfabba60954229159d34c2760cdf.jpg">
            </a>
            <div style="margin-left:12px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/anticapture" class="twitter-displayname">anticapture</a>
              <p style="margin-top:2px;line-height:1;"><a target="_blank" href="https://twitter.com/anticapture" class="twitter-username">@anticapture</a></p>
    
            </div>
            <a href="https://twitter.com/anticapture/status/2027140028007145851" target="_blank">
              <svg class="twitter-logo" width="20" height="20" viewBox="0 0 24 23" fill="none" xmlns="http://www.w3.org/2000/svg">
                <path d="M0.256759 0L9.36588 12.1823L0.200012 22.0873H2.26348L10.289 13.4158L16.7728 22.0873H23.7935L14.1723 9.21978L22.7043 0H20.6409L13.2506 7.98633L7.27889 0H0.258127H0.256759ZM3.29035 1.52002H6.51495L20.7571 20.5673H17.5325L3.29035 1.52002Z" fill="currentColor"></path>
              </svg>
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      [ANTICAPTURE::UPDATE V1]<br><br><img class="twitter-emoji" draggable="false" alt="🚨" src="https://abs-0.twimg.com/emoji/v2/72x72/1f6a8.png"> This is not the moment to lose funds. It never is.<br><br>Deeper risk assessment live: analyze holders and delegates, check token distribution, and track votes.<br><br>Security expanded. Not an alert. A necessity.<br><br><img class="twitter-emoji" draggable="false" alt="🔗" src="https://abs-0.twimg.com/emoji/v2/72x72/1f517.png"> Visit now: <a class="twitter-content-link" href="https://t.co/J9nzGBmHQK" target="_blank">anticapture.com</a> 
      <div class="twitter-media">
      <img class="twitter-image" src="https://pbs.twimg.com/amplify_video_thumb/2027137061199732736/img/o3VdOKsUoAXqmc2S.jpg">
    </div>
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/anticapture/status/2027140028007145851" style="margin-right:16px; display:flex; align-items:center;">
            <svg class="twitter-heart" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg">
              <path d="M20.84 4.61a5.5 5.5 0 0 0-7.78 0L12 5.67l-1.06-1.06a5.5 5.5 0 0 0-7.78 7.78l1.06 1.06L12 21.23l7.78-7.78 1.06-1.06a5.5 5.5 0 0 0 0-7.78z"></path>
            </svg>
            9
          </a>
          <a target="_blank" href="https://twitter.com/anticapture/status/2027140028007145851"><p>6:53 PM • Feb 26, 2026</p></a>
        </div>
    
  </div> 
  </div><h6 id="h-data-source-sporkdao-board-election-snapshot-export-february-27-2026-tokenomics-and-governance-documentation-sporkdaoorgtokenomics-blockful-is-an-independent-governance-security-organization-this-post-does-not-constitute-legal-or-financial-advice" class="text-4xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><em>Data source: SporkDAO Board Election Snapshot export, February 27, 2026. Tokenomics and governance documentation:</em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="http://sporkdao.org/tokenomics"><em> <u>sporkdao.org/tokenomics</u></em></a><em>. blockful is an independent governance security organization. This post does not constitute legal or financial advice.</em></h6><br>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <author>blockful@newsletter.paragraph.com (danimim.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/12901bb72c426f448e50b927bbb3ed1a8582038b0206ef15f707fd826f1deadf.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[How $3.6M in Liquidations Made $BAL Melt 50% in 2 Hours]]></title>
            <link>https://paragraph.com/@blockful/humpy-bal-liquidation</link>
            <guid>l4CXvC9NJWt5T8BiBxGQ</guid>
            <pubDate>Fri, 06 Feb 2026 20:38:52 GMT</pubDate>
            <description><![CDATA[A structural analysis of Humpy’s $BAL liquidation event, showing how concentration, leverage, and power turned influence into exposure through reflexive market dynamics.]]></description>
            <content:encoded><![CDATA[<h2 id="h-control-leverage-and-price-formation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Control, Leverage, and Price Formation</h2><p>In the early 2000s, a company came to believe it had discovered a durable source of power. Its business extended beyond the production of energy into the management of prices, expectations, and market perception.</p><p>At Enron, executives were compensated in equity, hedged exposure through complex financial structures, and simultaneously exerted influence over the markets in which they were the largest participants. Their position allowed them to shape reported performance, contractual terms, and forward expectations. For a period, this configuration remained stable. Market prices aligned with internal narratives, and those narratives were reinforced by concentrated ownership.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/fa5bc33fdbe393ade0064be590ed00f0f8d2b3ac7cae9cfb93b4f91df24dfa8e.png" blurdataurl="data:image/png;base64,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" nextheight="290" nextwidth="600" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener" class="dont-break-out GW0XC indIKd Hnk30e" href="https://www.nytimes.com/2006/05/28/weekinreview/28berenson.html">The Other Legacy of Enron - The New York Times</a></figcaption></figure><p>When market conditions shifted, there was no external pool of marginal buyers capable of absorbing risk. The actors most invested in sustaining price levels were also the most exposed to their decline. Defensive actions taken to protect individual positions compounded systemic stress. Value erosion followed directly from concentration, not in spite of it.</p><hr><h2 id="h-market-context-and-initial-shock" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Market Context and Initial Shock</h2><p>During the early hours of February 2,<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://br.tradingview.com/chart/bWXhWDvC/?symbol=BITSTAMP%3ABTCUSD"> <u>BTC fell from $78K to $74K</u></a>. The drop dragged the broader market down, with altcoins losing more than two digits in percentage terms.</p><p>Despite the negative impact across many tokens,<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.geckoterminal.com/eth/pools/0x5c6ee304399dbdb9c8ef030ab642b10820db8f56?utm_source=coingecko&amp;utm_medium=referral&amp;utm_campaign=livechart"> <u>one suffered far more than the rest: $BAL.</u></a></p><p>$BAL is the token of Balancer. It is among the DeFi tokens that have been losing value over the past few years. $BAL can be locked on Balancer in exchange for $veBAL, its governance token. $veBAL is used to decide which pools receive new $BAL emissions, with the goal of incentivizing liquidity.</p><p>One individual accumulated millions of dollars worth of $BAL over the past few years: Humpy. If you are not familiar with him, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://messari.io/report/governor-note-the-vebal-wars"><u>we recommend reading this article</u></a>.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1f4f23c22fd55f835e6a2562f382d8fbbcae375a15252376af4d56105144a535.png" blurdataurl="data:image/png;base64,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" nextheight="512" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://messari.io/report/governor-note-the-vebal-wars"><strong>Governor Note: The veBAL Wars</strong></a></figcaption></figure><p>Humpy is an important figure in Balancer’s story. He invested significant capital with the goal of capturing the $BAL incentives distributed by the protocol. He is known for attempting to capture DAOs across the market, seeking to extract as much value as possible by acquiring their governance tokens. <em>His most recent attempted attack took place on Compound.</em></p><hr><h2 id="h-collateral-practices-and-exposure" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Collateral Practices and Exposure</h2><p>As Humpy accumulated millions of dollars in $BAL, he began using it as collateral in lending markets such as Aave and Venus. $BAL was pledged as collateral to borrow stablecoins and <em>trade</em> in the market.</p><p>However, tokens like $BAL are extremely volatile. For this reason, lending markets typically set low LTVs, liquidating borrowers if their collateral loses too much value. This is a way to prevent bad debt—an insolvent position for the protocol.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/84e60a76311cdc98d418a964964b6f50dc39af60898dc39f956c5634ee141276.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAALCAIAAACRcxhWAAAACXBIWXMAABYlAAAWJQFJUiTwAAACYElEQVR4nK2SzU8TURTF71DefLzOvOmbdj47pUxbOk4rVZAUBqrUBCwSKUopiKFBDZtGwMQuCDGRxJ1scKHRxJgYEzckxIV7F+79b0hcuMCUwUqAhQuS3+Ju3jn3nPugXK40m08bjdW1tdbc3FKrtVWvP8A4hpB8IQDDiAAIgAPgGEZkIArAXZQ6QjJgHA0mlqUsS5Vw+gLVUWBgWamOB8XH8ynw3z3+h3YTRwCIbQPd6ME4inEM45gSTh/Np2EYsZPypOu5UGpSakYVS7XjwAsUgMR4NyL0hrp5itMIkTPr02KxZFlO8JIQjRDt3EwMIxKi+365XK7cnqoOl6cAIaJrySQdzyjTutyvy3kprAtCRAprGAdQQrRqteblrupGj+sWXLeQzw+aVm+oi/AsPZtAVeO60aPriUjYbicwjVQqOuHbG1l12o6MWUqxm+OomKRiMipmOJ5wgiyJBsEWQjIvHFeEMVXtuOWmAlFRimEcDfw6Nwh1i8AJMtuluUptQH/sRCZNqZhXl1Qxp4o5iYsb8nCYNYPqbTIew1nCJzBrAHCW52RK/WY2BcBrTgKgCwC3W4L2tf79IoSIjO0Zd7fq7k73vRqx1+95b/z4er+2oAhZT6sX9Iaf2HAilQF9xdPueuHFldebewfv9g4+fDv8/PX3p52fL/d/fXzypbn9fevH4X5+aghA6ASFEJISib7StVqudyIbL9/yH5YGFtLmqOfcuD5y58qlSUcfGy3UKqVHSWMwY/s3h5Yna/XZrfr88+X1t88Wtxszm/OrO82N963Zzfnai/t9w5dPhvgDwvxvDcTykggAAAAASUVORK5CYII=" nextheight="406" nextwidth="1202" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><em>$BAL liquidations on Venus and Aave between January 31 and February 2. All of them occurred at addresses 0x8a8…9a55 and 0x36cc…ffc6. Notice the difference in liquidation timing between Venus and Aave</em></figcaption></figure><p>When $BTC fell during the early hours of February 2, it directly impacted the price of $BAL. As a result, loans tied to addresses associated with Humpy were liquidated.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dune.com/queries/6663317/10499374"><u>Two addresses linked to humpy.eth</u></a> (0x8a8743afc23769d5b27fb22af510da3147bb9a55 and 0x36cc7b13029b5dee4034745fb4f24034f3f2ffc6) <strong>suffered liquidations of up to $141K.</strong> All of them used $BAL as collateral.</p><p>Adding up the liquidations across the<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dune.com/queries/6662293/10497928"> <u>lending</u></a><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dune.com/queries/6662735"> <u>markets</u></a>, <strong>$3.62M in $BAL was liquidated on February 2.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1a79d4c3c0d3ba0bb1a36d64398c06619a427935763606f89d1a24ca7c5bd2a1.png" blurdataurl="data:image/png;base64,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" nextheight="578" nextwidth="1192" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><em>Chart showing volume in the Balancer $BAL/$WETH v2 pool. On February 2, volume was approximately </em><strong><em>60x higher</em></strong><em> than the previous day.</em></figcaption></figure><hr><h2 id="h-liquidation-execution-and-liquidity-routing" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Liquidation Execution and Liquidity Routing</h2><p>As is common during liquidations in lending markets, bots searched for the best <em>on-chain</em> source of liquidity to sell Humpy’s liquidated $BAL tokens. In this case, that source was Balancer itself.</p><p>On February 2,<a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://balancer.fi/pools/ethereum/v2/0x5c6ee304399dbdb9c8ef030ab642b10820db8f56000200000000000000000014"> <u>the $BAL/$WETH v2 pool moved $5.8M, its highest volume since February 2023</u></a><u>.</u></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/34def68b54ec5cfa08ea1857187e903b9d2c409ab3e572a1a93ed4840df6b345.png" blurdataurl="data:image/png;base64,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" nextheight="410" nextwidth="1200" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><em>Each bar represents one of the top 10 $BAL selling addresses over the last 6 days. A standout is address 0xe75ed6f453c602bd696ce27af11565edc9b46b0d, which sold </em><strong><em>$763K worth of $BAL</em></strong><em> across </em><strong><em>83 trades</em></strong><em> executed in just over </em><strong><em>2 hours</em></strong><em>.</em></figcaption></figure><p>Analyzing the addresses that sold the most $BAL in the pool, the top 10 sellers dumped $3M worth of the token during the early hours of 02/02, precisely when the liquidations took place.</p><p>All signs point to bots <em>dumping</em> $BAL on Balancer—no anomalous behavior.</p><p>However, given the pool’s low liquidity, <strong>$3M of selling pressure</strong> had a direct impact on the $BAL price. <strong>Between 12:00 a.m. and 2:45 a.m. on the fateful 02/02, the token dropped 57%.</strong></p><p>The decline in $BAL directly affected Humpy’s loans. The lower the price fell, the greater the chance that his losses would grow even larger.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/09403bcb470f7cbe206edb45f9e04f78839bbdbb615a85f45712941e6c0f4141.png" blurdataurl="data:image/png;base64,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" nextheight="410" nextwidth="1194" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>When we analyze the largest $BAL buyers over the last 6 days, we see that all of them made their first purchases on January 31, when the liquidations began.</p><p>One address stands out among them: 0xeb9863e28d0fc0702a5197e66674f86ee2c35b5e.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://dune.com/queries/6663094/10499034"><u>Between 01/31 and 02/02, this address bought $1.41M worth of $BAL</u></a>, spread across <strong>268 trades</strong> executed during this period. The wallet is linked to other addresses in the top 10 buyers list, suggesting that the same entity or individual controls multiple wallets.</p><p>Although none of them are directly linked to Humpy, <strong>all evidence suggests that these purchases were made in an attempt to support the $BAL price and prevent further liquidations in lending markets.</strong></p><p>The sudden drop in $BAL is the result of a combination of issues:</p><ul><li><p>A large share of the circulating supply concentrated in one or a few wallets.</p></li><li><p>Lending markets accepting extremely low-liquidity tokens as collateral.</p></li><li><p>Weak risk management on both the borrower and protocol sides, with no effective way to liquidate large positions without significantly impacting price.</p></li></ul><hr><h2 id="h-at-scale-execution-converts-influence-into-exposure" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">At scale, execution converts influence into exposure</h2><p>In <em>The Merchant of Venice</em>, Shylock invokes the strict letter of the law to demand a pound of flesh from Antonio. He does not appeal to revenge or emotion, but to formal legitimacy. “<em>I stand for judgment,</em>” he says, insisting that the contract, precisely because it is valid, must be enforced in full.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/44a12a0ab37740c252d8e375318f2764dd9ddfcf43181d9581a967c111144924.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAARCAIAAAAzPjmrAAAACXBIWXMAAAsTAAALEwEAmpwYAAAGMUlEQVR4nBWUa09b5wGAj31u7/ue4+P7BeODDbaxwfgaYszFjnHwBTBwbBMnBhMIxCE2mBUDSSAKt5CStLA2GU3ahkKaVGKKmrVpG1ZWqeq27KJNk6ZFlaqpqrSu+zTt0z5PnfIDnkd6vjxYg5x2aGinDhzjGWcNU0nVH/40fvhBLsQzK6Oe7799/Yd/3t+5lU7ZwFYvdzCh/ryi/+0K/0lB+2le/esLuo/H1E9L+j9s2n+z2fD0iuXVgmty2D8y3JE503n6TCSXbcO8SrpJQ/n0oJVHLj21OtJ0MF//lw+zhZjli/3xH/+79+P/Hnz7p6unHHA7LpnrQGtR9q0E91lW9deS/qO8+rMxzTs5zeMZ3dEa/96kpniqdnjAkenz9SUD/UJLT7cdcyooj4o+rqNaq2mXjtwaN707bTza9lcGLA/m3c/vtx/tBm9XasfccCPIZB1w3o/e65E+n9C9uMw/LtQ8v1i12atay6j2i5qHZe10uup0ojYdt/fFXLGoPRLhsVY91W6gumwgYQOtNdSjefvBkm3nojrngItR5qOFqmKcGQ7A1U4m3wD7bGDShd6MSX4W5w4rTU/mrX9ebVoOyy8Luhtp6fsF9fqwLB3RpqLG/q76SNgUatNhcctL9aAZDnlgwESPhhWXBtWXUpxgB+Uwmo0xU2FUbkWpOpCsA4ITDjlgsRmNWuF2QrOV16wI/EwHd2lAuZaRXx6QZIIwcwL2BGXxDkVPWNnm4zChEQqNcKgGFlpQ1glzXnj2OFzrk3qlRDmCYhaQd8GLx9A5H7zQjOJ2cLoZnvehISO8l1YvnmCvRdmVfm66W1qMMTfHqu6WzYIfvpJSTiVlNyeqIn6InfW85J/kVXt5w90zqnwz89ZE9WpUbhKJU3YQNYNwNS3Ugb0xbc4NO+roQhBNutAYD9/oVs8fR+txbi7GFBOS22OajRT3cNqw3CdZ6OVmk+x4rzrmA9h5L9rt4n6Y5f993bOdlA94ZP/53cizBetxMeGVUyNO6EWUW0z88U5zJVndbQeDXpitBVE1XfCylRZ0MyGZ7ET5CFockI844cE59e+v8hMtqNMNLDYgeCA25UObYfZ1F/OrXsXjlOJBqeFgpfnobjgOKSdFNDG4QYxbKPEvb9jafTocw+qUoNcASja03MEsuNGtqGQnI5tpR4ITznWgeznFL6Z1F0LIxpOeetprorCQkk7x4E6AfTvK3YlKtnLWzYLjaD/sFuMBmuApXCsS2+TE/fMqjZREuLjHAjYF2ZOc6uCU4oOsYleQ7Q3K9zPyd7Ly9YRkaUByLfmyKWimKz2s20xh9ZBu58iHYW6vR9qqBy4pcW/Z/+KLwa4qOkSSbkRaCHzQDG5mZRiGsTS+0i35erft6I2O2+eUt8eVr40qbo0qbvRz/9isezyuKXcxk51oKABP+eCbeYWzjsIckPJLwUUfei0hC5kZHuFXMuqfX7G4OcJKEUYaN9G4kyMDPE2JRYRYnPfBZ9ePPbvlXxe45RS33CcpRdFSjH2xWPOsrFsSuHwQpj0wbgMzCUavwbFaQAZV4GQtPRngJpqQnMZLfmYrpUGYWCUmNARRDSmzhDBzhAzggCAiNrB1RraVld1ISTcGuIUEO92JHuSVz2f1O2lZxAoiNnDCQttVRMBIAVqMaSmq1wQEl/Rqki80Qg2JL0WlF9o4n5r0q8hGCd7Iks0ast1MG6SUHFG+amr+JDMTRsUwGmmHSR+cDaPDce1Xc/rtrCxkgbyCtCpJJYsrAS4SiTAdAG6OTthRKVrVqaf1OD7igsWTyKUju+rBVARlfbCdpz0qskFOOrRkxETv9sve7pOuRJhrMXYqhM53oKdn1TkXXBK4coxVsbhKgnOUSEKIMUyEmWVkDUu2akG2RdLfhIRGmHWiyTBTTigXBf3OqHq/qNkt6Tcy0lea0UaELQfQl+Par39i+GbW8N0c/3lBW4m8nKBdRVmUpEmKqxFZpyBYSkyKRBiGYSEDjNSDE1Y6YoVpLxwPosVedq9s/Piq9dG08VHZ+KhUdXi94WBM+2FK8f1CzTdz/N8v8X+bNfxrtfa7JeP+kHJd4IJG2qEla6XE2TAaaoepetCpp7WUmBKL/g/9O4ycVCFmuAAAAABJRU5ErkJggg==" nextheight="497" nextwidth="912" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>What the play exposes is not the illegitimacy of the contract, but the fragility of systems built on maximal enforcement. Once Shylock pushes his right to its absolute limit, the legal framework that grants him authority turns against him.</p><p>That same logic appears in financial systems where control, leverage, and enforcement converge. When power is converted into collateral and liquidation is triggered, the right to sell becomes inseparable from the inability to sell without collapse. What was once influence becomes exposure, and enforcement destroys the conditions that made power meaningful.</p><br>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/c9bb12d5218be55693661daa57d82b808de7526814ba5c8b54f38edf12faf701.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Futureswap: The Cost of Unobserved Governance]]></title>
            <link>https://paragraph.com/@blockful/futureswap</link>
            <guid>HkIndqwRfxBeQnuFjZ3n</guid>
            <pubDate>Thu, 18 Dec 2025 00:15:55 GMT</pubDate>
            <description><![CDATA[An analysis of the Futureswap incident and what it reveals about risk, legacy governance, and unobserved protocols.]]></description>
            <content:encoded><![CDATA[<p><em>Authors: </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/danimimm"><em>@danimimm (danimim.eth)</em></a><em>, </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/guiribabrb"><em>@guiribabrb (guiriba.eth)</em></a></p><p><em>We thank </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://x.com/lzhou1110/status/2001148759720272104"><em>lzhou1110</em></a><em> and </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.notion.so/Arbitrum-Core-23d556e0f58080e4b34fe24b117c82f4?pvs=21"><em>hklst4r</em></a><em> for their analysis — without which we would not have become aware of the attack on Futureswap.</em></p><hr><h2 id="h-a-forgotten-system" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">A forgotten system</h2><p>For centuries, the English Treasury recorded debts using wooden tally sticks. The system worked so well that it stopped being questioned: each tally was split lengthwise into two matching halves, creating a physical record that could only be validated by reuniting the originals. Forgery required reproducing an exact, irregular fit, which was practically impossible.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/cb13b67230f7d42b4369b1c13753f57ca4a2da2f90411022db9ea6234a623b29.png" blurdataurl="data:image/png;base64,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" nextheight="557" nextwidth="1000" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Medieval English split tally stick (front and reverse view)</figcaption></figure><p>When it was finally abandoned, thousands of forgotten tallies were burned beneath the Houses of Parliament. The fire spread and destroyed much of Westminster in 1834.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e373c185ed6f974dad1af03fb4a6bb4d0f534c100d32fa7d3a0968eeab44e389.png" blurdataurl="data:image/png;base64,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" nextheight="335" nextwidth="535" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">The Palace of Westminster on fire, October 1834, with Old Palace Yard in foreground</figcaption></figure><p>The system did not fail because it was attacked, but because no one was watching it anymore.</p><hr><h2 id="h-bridge-to-futureswap" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Bridge to Futureswap</h2><p>What happened at Futureswap on the night of December 16, 2025 echoed a similar pattern.</p><h3 id="h-how-the-attack-happened" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">How the Attack Happened</h3><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.futureswap.com/">Future Swap</a> is a protocol that <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.futureswap.com/">allows investors to use leverage</a> on any token. It has two types of users: (1) liquidity providers and (2) traders seeking leveraged exposure.</p><p>The protocol is governed by holders of its governance token, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.coingecko.com/en/coins/futureswap">$FST</a>. It operates as a DAO.</p><p>Yesterday, U$250K was stolen from its contracts due to a governance vulnerability. <strong>This money did not belong to the DAO itself, but to users who had funds deposited in Futureswap.</strong></p><p>To understand how the attack happened, we first need to look at a core crypto primitive: <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://docs.uniswap.org/contracts/v2/concepts/core-concepts/flash-swaps">flash swaps</a>.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/ba818a771681037bf739aa682c139ca4b17ae2251eb3c6f111f94613f4ff513e.png" blurdataurl="data:image/png;base64,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" nextheight="809" nextwidth="1024" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Decentralized exchanges allow users to buy and sell tokens within the same block without needing upfront capital. You effectively “borrow” funds from a liquidity pool and repay this “loan” within a single transaction.</p><p>Some of the main use cases for this functionality include (1) token arbitrage, (2) executing multiple operations in a single transaction, and even (3) gaining leveraged exposure to other tokens.</p><p>Flash swaps, like flash loans (which are similar but exist in lending markets), are primarily used by bots to arbitrage tokens. Unfortunately, they are also tools frequently used by hackers to exploit and drain protocols — in this case, DAOs.</p><br><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/d5fba7195250883c7a74cd0c37cfaa2e4f2e52b800c2f95dbc962cf92912dffc.png" blurdataurl="data:image/png;base64,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" nextheight="168" nextwidth="850" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><em>Simulation of a flash loan attack on Maker — </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.researchgate.net/figure/Example-flash-loan-attack-against-Maker-DAO-All-steps-can-be-executed-within-one_fig3_339374442"><em>a procedure that is similar across virtually any other DAO.</em></a></figcaption></figure><p>In a flash loan or flash swap attack against a DAO, the attacker borrows millions of dollars’ worth of governance tokens to gain enough voting power to pass any proposal within the DAO. This grants them the ability to change security parameters, drain the DAO’s treasury, and even steal funds from protocol users.</p><p>This is possible because governance contracts commonly take a snapshot of voting power at a specific point in time. The goal is to ensure that members’ voting power does not fluctuate during an active vote.</p><p>What a flash loan or flash swap attack exploits is this exact mechanism: the attacker borrows tokens precisely in the block where the governance snapshot is taken. The loan lasts only one block (around 12 seconds on Ethereum), has a near-zero cost, and can temporarily make the attacker one of the most powerful members of the DAO.</p><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://medium.com/immunefi/hack-analysis-beanstalk-governance-attack-april-2022-f42788fc821e">Beanstalk is a well-known case of a governance attack</a> using flash loans — and Futureswap met a similar fate.</p><p>In the Futureswap attack, the hacker executed a flash swap of $FST on Uniswap v2 exactly at the moment the DAO snapshot was taken, which happens when a proposal is submitted to governance.</p><p>As a result, the attack followed three steps: <strong>(1) submitting a proposal to (2) trigger the snapshot and, within the same transaction, (3) executing a flash swap of enough $FST to become one of the addresses with the highest voting power in Futureswap.</strong></p><p>In the block following the submission of the malicious proposal, the attacker controlled 10% of the circulating supply. With this voting power, they were able to decide the outcome of any proposal in the DAO.</p><p>In this case, the attacker used that power to drain funds belonging to Future Swap users — a total of U$250K.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e93976a0331e41a84c3ba1e812ab1e7ab570eb62bfddc28b732dc4dd15ce5d33.png" blurdataurl="data:image/png;base64,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" nextheight="276" nextwidth="1088" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Snippet of the “snapshot” function in the Futureswap governance contract — highlighted by <a target="_blank" rel="noopener noreferrer nofollow" class="dont-break-out css-146c3p1 r-bcqeeo r-1ttztb7 r-qvutc0 r-37j5jr r-1inkyih r-rjixqe r-16dba41 r-1ddef8g r-tjvw6i r-1loqt21" href="https://x.com/@lzhou110"><u>@lzhou110</u></a> </figcaption></figure><p>This makes it clear that the critical flaw in Future Swap was its “snapshot” function.</p><p>Today, governance contracts include protections against flash loans to prevent attacks like this one. These protections include:</p><pre data-type="codeBlock" text="function propose(
        address[] memory targets,
        uint256[] memory values,
        bytes[] memory calldatas,
        string memory description
    ) public virtual override returns (uint256) {
        require(
            getVotes(_msgSender(), block.number - 1) &gt;= proposalThreshold(),
            &quot;Governor: proposer votes below proposal threshold&quot;
        );
"><code><span class="hljs-function"><span class="hljs-keyword">function</span> <span class="hljs-title">propose</span>(<span class="hljs-params">
        <span class="hljs-keyword">address</span>[] <span class="hljs-keyword">memory</span> targets,
        <span class="hljs-keyword">uint256</span>[] <span class="hljs-keyword">memory</span> values,
        <span class="hljs-keyword">bytes</span>[] <span class="hljs-keyword">memory</span> calldatas,
        <span class="hljs-keyword">string</span> <span class="hljs-keyword">memory</span> description
    </span>) <span class="hljs-title"><span class="hljs-keyword">public</span></span> <span class="hljs-title"><span class="hljs-keyword">virtual</span></span> <span class="hljs-title"><span class="hljs-keyword">override</span></span> <span class="hljs-title"><span class="hljs-keyword">returns</span></span> (<span class="hljs-params"><span class="hljs-keyword">uint256</span></span>) </span>{
        <span class="hljs-built_in">require</span>(
            getVotes(_msgSender(), <span class="hljs-built_in">block</span>.<span class="hljs-built_in">number</span> <span class="hljs-operator">-</span> <span class="hljs-number">1</span>) <span class="hljs-operator">&gt;</span><span class="hljs-operator">=</span> proposalThreshold(),
            <span class="hljs-string">"Governor: proposer votes below proposal threshold"</span>
        );
</code></pre><p><em>Snippet of the flash loan protection in the </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://vscode.blockscan.com/42161/0xf07DeD9dC292157749B6Fd268E37DF6EA38395B9"><em>Arbitrum governance contract</em></a><em>.</em></p><ul><li><p>A snapshot that records voting power at a block prior to proposal submission. This way, if a flash loan is executed in the same block, it is not taken into account — because the relevant voting power is fixed in the “past.”</p></li><li><p>A snapshot taken after a predefined period known as the <strong>Voting Delay</strong>. With a Voting Delay, governance participants have time to coordinate and respond to potential attacks or issues with a proposal.</p></li></ul><p>Both mechanisms are standard security in the governance contracts of the largest DAOs in the industry, such as Uniswap, Compound, Aave, and ENS.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/a3520700bcfd32672d65ddbaf1ca013fbe097228a0d3056c970b1ec07b4a47ed.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAJCAIAAADcu7ldAAAACXBIWXMAAAsTAAALEwEAmpwYAAACpUlEQVR4nH2S30tTYRzGz0AQguP2pq97d3jdTvPo2Thiw6vjLzBQsRJcjFkH3NC3dnLLbW0zfY0Nj8nJTroVWyjRpVAX/QddSpcSLItgEV0MwYtlQvcW24GokOBz8XwfXni+PN+X0bR1jJ0IcRZLE8Mwzc3nAICmsFiaAIAWS5MJAJDn3QBAjJ087z4TzoGBFXIOzDmwKHpVdZ6R5X6fr29391W1elitHpbLB7Xa8enpz1rtuFL5sr//7ujoW7V6eHLyI5tdleWh7e0Xsjx4ZgbnwNFU/P33Ty/fvM49fHDl8lVB6GJ6ei5KUu/o6LhhbBWLO5TmCLllGFvLyyuapivKTDa7qmnrmrbu9wdE0RsM3vD5+njeLQjd/8Dz7kvj4/OpO6HI7OTU1ED/MMYuxufrw9jJOTDL2ljWZjYAoR0hDkKEsQshzoTnO0XRi7FLEESPR5KkXhOPR/qNIHRjzunscLsvCGYkI8uDlcrXcvng4MPHvb23lcpnAKAZgBBnr4Mw7oDQ3vDbEXJA2A4ANJ+1tsHWtrr/52hHDnNRjJ31AMMo6Lqhafq9RarrhqKEFu4kgsHrgWvBiYlJQiJjYxOERCjNhcPE7w8QElHVqKpGp6cVQiLhMFGUUDKZVpSQqkZjsYSizMQXUgP9wwhx9Yqy2bXNx08N44muG4ZReFZ6vqFvUporFncK+VKxuKNp+tLi/UyGZjKUkEgymaY0l7q7NDt3U1WjlOZCoblkMr1Cc8lkOhZL+P2BWCwhy0MQ2pmRkdFsdm0hnt54lNd1I5OhhXwpFotHb8cpzem6QUikkC/J8iDL2hrVOSC0mzTuZG/0Zoq/fIQ4UfQyiUTK2gIAgNYWYLXVhXnqBudNzbI2hDiz0//i4vnOxo/qEoQuSepRlJlf0wLph7jeGTMAAAAASUVORK5CYII=" nextheight="284" nextwidth="1054" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/ens/risk-analysis"><em>Anticapture</em></a><em> – Risk Analysis of the ENS page</em></figcaption></figure><p>One of the key parameters evaluated by Anticapture when auditing a DAO’s governance is its protection against flash loan or flash swap attacks. None of the DAOs we have analyzed so far have failed this test — all of them include safeguards against attacks like the one carried out on Futureswap.</p><p>However, these are large, well-established DAOs. Smaller projects may not benefit from the same level of security in their governance design or code — and this poses a serious risk to users and to the broader ecosystem.</p><hr><h2 id="h-a-shift-in-how-we-define-risk" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">A shift in how we define risk</h2><p>Recent incidents across DeFi point to structural patterns beyond protocol-specific failures or any single incident.</p><p>Without speculating on timing or intent, and without attributing causality where evidence is still incomplete, it is still possible to observe recurring structural characteristics across recent events:</p><ul><li><p><strong>Balancer:</strong> exploit leveraging batch swaps with deferred settlement in the V2 Vault, where composable stable pool mechanics and rounding behavior in EXACT_OUT swaps allowed liquidity to be reduced to extreme levels.</p><div data-type="twitter" tweetid="1990856260988670200">
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/Balancer">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/28ef6e6389ee4483fee5cdd5d1e28463f30862599d4f0d6cc2082264bb82132d.jpg">
            </a>
            <div style="margin-left:12px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/Balancer" class="twitter-displayname">Balancer</a>
              <p style="margin-top:2px;line-height:1;"><a target="_blank" href="https://twitter.com/Balancer" class="twitter-username">@Balancer</a></p>
    
            </div>
            <a href="https://twitter.com/Balancer/status/1990856260988670132" target="_blank">
              <svg class="twitter-logo" width="20" height="20" viewBox="0 0 24 23" fill="none" xmlns="http://www.w3.org/2000/svg">
                <path d="M0.256759 0L9.36588 12.1823L0.200012 22.0873H2.26348L10.289 13.4158L16.7728 22.0873H23.7935L14.1723 9.21978L22.7043 0H20.6409L13.2506 7.98633L7.27889 0H0.258127H0.256759ZM3.29035 1.52002H6.51495L20.7571 20.5673H17.5325L3.29035 1.52002Z" fill="currentColor"></path>
              </svg>
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      <a class="twitter-content-link" href="https://t.co/y5owcuek5B" target="_blank">x.com/i/article/1990…</a>
      
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/Balancer/status/1990856260988670132" style="margin-right:16px; display:flex; align-items:center;">
            <svg class="twitter-heart" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg">
              <path d="M20.84 4.61a5.5 5.5 0 0 0-7.78 0L12 5.67l-1.06-1.06a5.5 5.5 0 0 0-7.78 7.78l1.06 1.06L12 21.23l7.78-7.78 1.06-1.06a5.5 5.5 0 0 0 0-7.78z"></path>
            </svg>
            316
          </a>
          <a target="_blank" href="https://twitter.com/Balancer/status/1990856260988670132"><p>3:54 PM • Nov 18, 2025</p></a>
        </div>
    
  </div> 
  </div></li><li><p><strong>Yearn:</strong> incident in a custom yETH stableswap pool, based on modified stableswap code, resulting in excessive minting of yETH; isolated from Yearn V2/V3 vaults but leading to approximately $9M in losses across affected pools. </p><div data-type="twitter" tweetid="1995344733154251000">
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/yearnfi">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/02229c9c23d1066c53dd580a11d9b9266d267ede49d75aacc33ff4c627736df2.jpg">
            </a>
            <div style="margin-left:12px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/yearnfi" class="twitter-displayname">yearn</a>
              <p style="margin-top:2px;line-height:1;"><a target="_blank" href="https://twitter.com/yearnfi" class="twitter-username">@yearnfi</a></p>
    
            </div>
            <a href="https://twitter.com/yearnfi/status/1995344733154250993" target="_blank">
              <svg class="twitter-logo" width="20" height="20" viewBox="0 0 24 23" fill="none" xmlns="http://www.w3.org/2000/svg">
                <path d="M0.256759 0L9.36588 12.1823L0.200012 22.0873H2.26348L10.289 13.4158L16.7728 22.0873H23.7935L14.1723 9.21978L22.7043 0H20.6409L13.2506 7.98633L7.27889 0H0.258127H0.256759ZM3.29035 1.52002H6.51495L20.7571 20.5673H17.5325L3.29035 1.52002Z" fill="currentColor"></path>
              </svg>
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      At 21:11 UTC on Nov 30, an incident occurred involving the yETH stableswap pool that resulted in the minting of a large amount of yETH. The contract impacted is a custom version of popular stableswap code, unrelated to other Yearn products. Yearn V2/V3 vaults are not at risk.
      
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/yearnfi/status/1995344733154250993" style="margin-right:16px; display:flex; align-items:center;">
            <svg class="twitter-heart" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg">
              <path d="M20.84 4.61a5.5 5.5 0 0 0-7.78 0L12 5.67l-1.06-1.06a5.5 5.5 0 0 0-7.78 7.78l1.06 1.06L12 21.23l7.78-7.78 1.06-1.06a5.5 5.5 0 0 0 0-7.78z"></path>
            </svg>
            285
          </a>
          <a target="_blank" href="https://twitter.com/yearnfi/status/1995344733154250993"><p>1:10 AM • Dec 1, 2025</p></a>
        </div>
    
  </div> 
  </div></li></ul><p>All point to a common direction: risk is no longer concentrated where attention traditionally lies.</p><p><strong>Two dimensions are particularly worth examining:</strong></p><h4 id="h-1-recent-attacks-concentrate-on-what-is-still-live-but-no-longer-watched" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">1) Recent attacks concentrate on what is still live, but no longer watched</h4><p>A recurring pattern in modern exploits is the targeting of components that are not new, not actively evolving, and not central to day-to-day operations, but that still custody value.</p><p>These are not necessarily deprecated systems, but systems that have become background infrastructure: older contracts, legacy libraries, rarely exercised code paths, governance mechanisms assumed to be settled, or features that “worked fine for years”. In each case, the vulnerability was not hidden. It was simply no longer salient.</p><h4 id="h-2-risk-surfaces-were-limited-by-the-speed-attention-and-creativity-of-human-adversaries" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">2) Risk surfaces were limited by the speed, attention, and creativity of human adversaries.</h4><p>Certain attack paths existed in theory, but not in practice: they required levels of combinatorial exploration, cross-domain reasoning, or exhaustive simulation that were simply not economically viable. As a result, these risks did not meaningfully exist at the human surface.</p><p><strong>AI introduces a new category of risk:</strong> AI expands what is economically and cognitively feasible. It enables continuous analysis across abandoned codebases, systematic exploration of state spaces (far) beyond human reach, and adversarial recombination of known primitives at scale. Patterns that once required prohibitive effort become accessible, repeatable, and persistent.</p><p>What was previously invisible becomes legible, and what was once theoretical becomes actionable.</p><h2 id="h-the-limits-of-risk-assessment-in-practice" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The limits of risk assessment in practice</h2><p>Risk assessment is often discussed as if it were exhaustive, continuous, and evenly distributed across the ecosystem. In reality, it is constrained by time, attention, incentives, and visibility. Anticapture and similar efforts operate inside those constraints.</p><h4 id="h-1-finite-resources" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">1) Finite resources</h4><p>Risk assessors do not operate in a vacuum. They operate inside an ecosystem whose incentives are heavily skewed toward expansion, such as like:</p><ul><li><p>Token launches and airdrops,</p></li><li><p>Protocol growth and integrations</p></li><li><p>New chains, new deployments, and new surfaces</p></li></ul><p>This creates a structural race against time. Risk assessment competes with growth narratives for limited attention, and legibility across the ecosystem remains uneven by design. In that context, risk does not disappear. It accumulates.</p><h4 id="h-2-when-opacity-limits-assessability" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">2) When opacity limits assessability</h4><p>Non–open-source systems significantly limit pre-incident analysis.</p><p>In the case of Futureswap, the lack of open-source contracts materially constrained pre-incident analysis. Without access to code, assessors are limited to behavioral inference. This raises an uncomfortable but necessary question: <strong>What security assumptions remain unverifiable in closed-source systems?</strong></p><p>Without source code, assessment becomes probabilistic rather than structural, and mitigation shifts from prevention to post-hoc interpretation.</p><h4 id="h-3-out-of-scope-systems" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0">3) Out-of-Scope Systems</h4><p>A final constraint is more fundamental: some DAOs and protocols exist outside the shared field of awareness. Risk assessment assumes a known universe of systems. In practice, that universe is incomplete.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/98de1022236a23297522e384f2462523f145e4eb6fb10a1286ef843f6410461c.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAbCAIAAACSpRrNAAAACXBIWXMAAAsTAAALEwEAmpwYAAAHJklEQVR4nJVWa08j1xl+be9gj+fmM/fx+I7xBYwBM3gNNgZjG4MN5mouGwiX4F2g0LDZBpZt0WazaXeTJs0mWSVqoipKVupupUpRUymK1EjJh0hJ2g/9A61UtZ8qtR8rVeoHV2OzsKRUVaVHR2fOzJznzPO+z/sOYEj+T5h55dx17P9/Es5ZZQTASIwRzbzShP77+4xoIjnASBPJY4zYWPkfBE1IMZI2FNak9KSZV8BgNuA2E8lhSGrcNfOKieRRWPNMbjL+jua5PUHL054wKbsvMCwpu0/2OZ+gvikuJUZ2P/1beO1m2+WXvNPb7Zsve6e3MCQZSZ0MDDgpu/2Lz7c8daBdvR/ZvDP04qPE/k99s7va1Tfl5Jh+oCc+5axEjGjh7ZSjxTG6pGRmw2s3/QvX7PkFXsuzbX1sW68Qy0h9o2I8L6XKYl9R7i3y8RG1sKQWllzjVSk97Z6oorBGOQMnsXmCgBFJ2Sulyijcg4LdTEBDwW62Lc51DnCxQS6aRGGNdoW4zn5By5Gyl3YFKWeAdgVJezPlaKFUP+0K0q4gYfdKiZHzCWhXkI2mAKP1b2SEBkwkdwLASMrTSrtCBtxm1oPM1x/Qx8bEgNsIu1eMD5+odEoAFpKUvUKiiDHSSUjMdTShx+nECIKWoxwtQLAGJGBIxlkFZ/W7jdFEcrSvTe4t1lPjLIGztKoMTKv5BQxJpORuQoqB1rcw0EJj0iCwZxeaePtoaCzpzwBlAwrpI80BZTMgyURyKNgtJ8cMuK1xJp2gwexfuMbFBpXsPMaIvtiUGsrw7g6MERl7gFH8GCPoLzCCu7RuqRPMR+enIjOlUHmgJR9x90xFKmF3DCy0LdAtJQq6hvxZAik9zWk5JVUGC+7uLEeHngunNprj8yOrD32xKSAoC2/XCcY2gJN6PMnV7tWtniuLHUuFYLGqbUy2Tcd9/ecT6OmPM87SqlpYFrQ84AwlNzsiwzZnu6M172jNu9qL+u71RFALyzivEmxdX5oHnAGSAYoFW11GSpdIjA+fkcjM6wYOrhw6S+tickzPIiQDQTUCADQ6iTaGZEd2ARgRzCRQehiDjmC3L+JXA7zsBlYCnGL9XUqqbCK5UwKMEQm71ze7owxVpPQkAFaXWzTgNsDoOkjArAYjDmA0D8xc9Hf9anzz95f23y+s3huY+0l69ubF4mFs+F5yIucKg+IRUmUzc5wXoOuD0WpmNrr9ithXtOcXTSRH2L20J8x1DsjJMSU1pqTKamZWGqp4CkufHX5Y+/B3tftfVnfvaQvPtc7sRmd2IjM7ysSVyuU7tXe++vPOa8HlG0DzeEPGY4t5wrioColCYPm6oOXU/IKanRPiebYtjsIa29bLRZN0e9+jrVdrd3+911cG2WXwhK3eVsLXTjV30G0JScuCloVgV+36e7W3Pgckms74gBEBQIhl1OwcAADBgcVmwI9htrLQhOc87b+c2t4cXQcLYa47HKOOYcR1GUOis0v1m5BUe+OTd4ZXgaAJVjkhEGhfxDVedY1XzVYkqS5GUi8gGX8c2wtIfqo9fXvqO4GRFTAznOTiRQcgqXFMSrCDlfrHs/dqt34ORsMLWz/+17X7GJJNp2mKkaGVo9aVI7b0TCroPyhlEqEgEDzQkhFJQAtOxbccSc+kprjUBELincz8M7Ecwcq0YAebSLEKUNzDsa3fLl8Ho6G8cvTN0z/ocIeB4k4JfLM7vuktdWLLo6iH44MHpYH90fT+aPrWRPbm5ODz+fzr6fmJVJnun8Qo7mrv2EHvxLuF1QfF6ruFtQfF6o3UZKe7dbunCBZqePnw77uveWQf0MIpgVpYbp7bc5bWMSR7nJ4Wl3dvuH+4q30g0toTCsxeTMyF+q6WNtDwotnK0oIqSq64NxJxhT4oVV/sr8iy2yl7R8IJMBouL33/T5t3gWSOY9DojqG1I2dp3Z5dsIoOoKU6RB1WQZ9TMlxo+mLrlXJlD0BPbgxJYBOB4lodIf2wFAdWFozGPl9H7Ye/iHujQHE4+ziLzLxSuPuRmp1zFp7W6z7OGHFazw1cn5iaKIJgwIBdiqRqb346Hu7FbRIgfXe9VJhxIBgTkro9kfdG1mof/+HrGw+AoCn2CSeTsrf72TdcoyuRzTtsNMV19nOxjBAb1KHlxHhe0HKyljUkx7/Y/1nt/a8fbb26nyjdGFp8ffHg4caPHs3v/6ay98/vvV37+C9/vf1R/9EH3+oHkoW3c50pwu7lOvsbBEIsozfLzgFBy0mJghAvCLGMEE2C2ly9OPrl2gsvZxa3e0ZWY9krWuFWuvLJ7Hf/uHH7VroCVtTEKw0bn+1oOIMxQsNZ+oef4LgWkYAzuukoAUiGF9VcoCcb0MbDvZX29KXo4HzHoB4Jgql3t/P+ixqGanTHk/L5LTQKJMEqujlwBmjepHtN0us2qV8Sdd2f/PH6NwWogy7Rbq3fAAAAAElFTkSuQmCC" nextheight="687" nextwidth="800" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>When a DAO or a protocol is effectively invisible to most participants, mitigation becomes reactive by default. One cannot assess what one does not know exists. Discovery itself becomes part of the risk surface.</p><h2 id="h-legibility-as-a-precondition" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Legibility as a Precondition</h2><p><strong>We are evaluating the feasibility of identifying systems that remain live but fall outside active awareness. This includes dormant DAOs, legacy deployments, and under-observed components that continue to custody value. The objective is not post-incident analysis, but reducing the likelihood of failures that result in material losses for users and protocols.</strong></p><div data-type="twitter" tweetid="2000625205111128600">
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/CupOJoseph">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/459b397f5cdd15727cd5f624f2d28d68671f30053d89e4290f2346cb910f241d.jpg">
            </a>
            <div style="margin-left:12px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-displayname">CupoJOSΞPH 🐌</a>
              <p style="margin-top:2px;line-height:1;"><a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-username">@CupOJoseph</a></p>
    
            </div>
            <a href="https://twitter.com/CupOJoseph/status/2000625205111128486" target="_blank">
              <svg class="twitter-logo" width="20" height="20" viewBox="0 0 24 23" fill="none" xmlns="http://www.w3.org/2000/svg">
                <path d="M0.256759 0L9.36588 12.1823L0.200012 22.0873H2.26348L10.289 13.4158L16.7728 22.0873H23.7935L14.1723 9.21978L22.7043 0H20.6409L13.2506 7.98633L7.27889 0H0.258127H0.256759ZM3.29035 1.52002H6.51495L20.7571 20.5673H17.5325L3.29035 1.52002Z" fill="currentColor"></path>
              </svg>
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      In 1854 a physician named John Snow created a Dot Map of cholera cases and was able to prove that the disease came from bad water, revolutionizing public health while founding epidemiology as a science.<br><br>Proof that 1 good data visualization can change the world.<br><br><a class="twitter-content-link" href="https://twitter.com/anticapture" target="_blank">@anticapture</a>. 
      <div class="twitter-media"><div class="twitter-two-images"><img class="twitter-image" src="https://storage.googleapis.com/papyrus_images/a780c865f14f793707d7fcbcea24fc84e45eda9554fa72dcc0e1c8f1fc6d5136.jpg"></div></div>
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/CupOJoseph/status/2000625205111128486" style="margin-right:16px; display:flex; align-items:center;">
            <svg class="twitter-heart" width="16" height="16" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg">
              <path d="M20.84 4.61a5.5 5.5 0 0 0-7.78 0L12 5.67l-1.06-1.06a5.5 5.5 0 0 0-7.78 7.78l1.06 1.06L12 21.23l7.78-7.78 1.06-1.06a5.5 5.5 0 0 0 0-7.78z"></path>
            </svg>
            36
          </a>
          <a target="_blank" href="https://twitter.com/CupOJoseph/status/2000625205111128486"><p>2:53 PM • Dec 15, 2025</p></a>
        </div>
    
  </div> 
  </div><p>Visibility does not always guarantee safety, but the absence of visibility consistently precedes governance capture.</p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (danimim.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/4647c412ffe0a95676b25b638c4ae329a1e60ff46094ba596c0d034a23b1d8d4.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Lessons from Arbitrum DAO: The Architecture of Governance]]></title>
            <link>https://paragraph.com/@blockful/arbitrum-security-council</link>
            <guid>FL3jj6ORPmEjIF3ib5JY</guid>
            <pubDate>Fri, 24 Oct 2025 00:51:03 GMT</pubDate>
            <description><![CDATA[On October 20, 2025, blockful purchased 14.4 million votes through LobbyFi during the Arbitrum Security Council election, exposing governance vulnerabilities.]]></description>
            <content:encoded><![CDATA[<h3 id="h-introduction" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0"><strong>Introduction</strong></h3><p>On October 20, 2025, <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://blockful.io/"><strong>blockful</strong></a> purchased 14.4 million votes through <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://lobbyfi.xyz/"><strong>LobbyFi</strong></a> during the <strong>Arbitrum Security Council election</strong>, bringing to light scenarios that most delegates and DAO participants don’t even imagine.</p><blockquote><p><em>“LobbyFi allows users to delegate their voting power in a DAO, which can then be bought by others in auctions or at a fixed price to influence voting decisions.”</em></p></blockquote><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/739f239980e7640dba7886b179219ce425176cdd5a698d98f13ab55c286fa075.png" blurdataurl="data:image/png;base64,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" nextheight="1400" nextwidth="2940" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>LobbyFi, only weeks or months earlier, had publicly stated that they would not activate their protocol for Security Council elections. A controversial point, they had been active participants in governance and, even when not seen as entirely non-malicious, many believed they would at least be aware of LobbyFi’s moves through their ongoing communication with the Arbitrum DAO, and likely with both the OpCo and the Foundation.</p><div data-type="twitter" tweetid="1980336194044264549"> 
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/CupOJoseph">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/459b397f5cdd15727cd5f624f2d28d68671f30053d89e4290f2346cb910f241d.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-displayname">CupoJOSΞPH 🐌</a>
              <p><a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-username">@CupOJoseph</a></p>
    
            </div>
            <a href="https://twitter.com/CupOJoseph/status/1980336194044264549" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      Today will be a serious turning point in the history of Arbitrum DAO.
      
      
      <div class="twitter-quoted">
        
  <div class="twitter-quoted twitter-embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/CupOJoseph">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/459b397f5cdd15727cd5f624f2d28d68671f30053d89e4290f2346cb910f241d.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-displayname">CupoJOSΞPH 🐌</a>
              <p><a target="_blank" href="https://twitter.com/CupOJoseph" class="twitter-username">@CupOJoseph</a></p>
    
            </div>
            <a href="https://twitter.com/CupOJoseph/status/1970187380566171939" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      Just kidding. Lobbyfi voluntarily abstains from participating in Security Council elections because they are actually a force of good, and not evil like some might want you to believe.
      
      
       
    </div>
    
  </div> 
  
    </div> 
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/CupOJoseph/status/1980336194044264549" style="margin-right:16px; display:flex;">
            <img alt="Like Icon" class="twitter-heart" src="https://paragraph.com/editor/twitter/heart.png">
            15
          </a>
          <a target="_blank" href="https://twitter.com/CupOJoseph/status/1980336194044264549"><p>3:11 PM • Oct 20, 2025</p></a>
        </div>
    
  </div> 
  </div><p>The issue, however, does not lie in communication, in the vote-buying protocol itself, or in any assumptions the DAO may make. The real problem is that we seem to have forgotten the <strong><em>trustless core</em></strong> of the ecosystem. As <em>cliché</em> as it may sound, we should not rely on assumptions (for example, <em>“Delegates are honest, so it’s safe to reduce the delegate voting power (DVP) quorum,”</em> or “<em>It’s fine, we talked with LobbyFi and they won’t participate” - which we heard from different stakeholders</em>).</p><p>I personally appreciate when the <strong>normalcy bias</strong> is challenged. There have been numerous comments, suggestions, forum posts, and improvement attempts from various delegates over time. With the normalcy bias now broken, we must address the motivations behind this action, understand its implications, and, most importantly, discuss what must be discussed: the issue exists at the <strong>mechanism-design level</strong>. Let us take it step by step.</p><figure float="none" width="477px" data-type="figure" class="img-center" style="max-width: 477px;"><img src="https://storage.googleapis.com/papyrus_images/57f2372044eaca2e34959991a1b1a408d3b28537a02e858fd66f99dbaf9d9c7f.png" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAWCAIAAAAuOwkTAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFNUlEQVR4nHVVQW/TSBi1OHBC4lAJhFAPSIgeuFQIIf5Db5w59II4VBUqkSwrSzabDVbIWsqGOqsQDPFuyBKcbEjIGrfBGCyvixtMjTF1wySO6+K6YaNcot6QkFb1sIGk8GRNvhlP/Pn5e98bxHEcz/P6/X7Ph+d53W631+t1u93BYGAYBoZhvV7PcZx+v//x40eSJFmW5XleFMXd3d1+v+95HgDA2gcAgG3biCRJCIKcPXv2xIkTJ0+enJiYOHLkCIIgp0+fnpqampycPHbs2KlTp6amphAEwTDszJkzCIIcP358enp6YmJicnJyZmZmMBhYlmWPAq4g9Xod+R8HDx48f/789PQ0jOHi4cOHDx06NDs7iyBIPp+fmZlBEOTo0aMHDhyAG86dOzcYDOD7fiOBZVmKopimqet6s9nUNE3XdVVVNU0zDAPGlmURBIFh2KdPn2zbbjQaAABVVeH+/Y8eSQAn8Lu7PhzHgQGMh+h2u/A/ruvCEe785tO/JDAMIxqNUhSVz+cLhUKz2YT1Ga1b27I6rVarY9udTseyrFa73Wq3vy7pdxMAAOr1uiRJgiAYhgGpQBV5nue6bteHu+XsbLtd7/3OtvvlcvcWPW/b87zvFtnzPFmW4esnk8l0Oo2iKEEQ8XicJMlUKhUKhejs3aq4SjIcVRWYJ9L9JfFuVbhdfvJgWWKerhQr1Z/CYUj9a0KfE7iuqyhKzQfDMCzLFgqFcrkcDAZJktQ0jWXZWu2R8Gp9aWWNW9EkfUNUjaerb7gV7bn6RlrbUFZfsiwLGcM28jxvvMiu61YqlVqtxvM8x3GVSkUQBI7jFEVpNBqCICxzXEN5IT7jlx+zyopcqz6sP2YbygtJfF4o3JckqV6vMwzD+SiXy7CEnxNYlmUYRiQSCYfDKIriOB4IBHAcR32QJBkKhUiSZBjmF4KI+vjh2rWrgau53L1EIoGiaCwWI32EfcRisREGUMjNZlOWZV3Xbds2TRMA0Gq3YVvoum4Yhqqqw1jTNNgEhmE0m02oOgCApmmqqhqGYZrmOAMURS9cuLB4cxFF0YWFhUuXLl2PRiORn+fn53EcD4VCKIoGg8FoNHr58uW5ublsNjvn4+LFi7OzszRNz8/PLywsXLlyBcMwlmVd17Us6zODTdt2nM626+5426Iodqy2u+V0LAuOsKGGPui6LgBgWFVVVeEUrkNxO47zNYP2O9Aq1OUb9x6RxeXfuX/o2vNfH3A4XaVrIsuygUCAoqhEIkFRFIqiAR84jqfT6XA4HAgEIpFIJpPBcTwYDKIoynEctNgvNejYtt60Xq6Dl+tAM1v6Rkt6vbFmtl69fQdtB35uVVVFUVQURdd1RVEkHzzP0zQNXUtVVVmWNU0bYQAllUmnb+DX79/LJRMJKnMrEv6Rytz6LZUiCAIqJOMjl8tRFBWLxVKp1G2Kurm4mEqlcrkcbEm4wXGcERVB86FpulQq5X0UGOaPXK5crjysVAqFQqlUomm64oPn+Uqlks/n6Wz2DkWVisXyX0VJFLMUdSudzuVy16PR8QSQQaPREEURUoZ65ThOEARZlgEApmmKosjzPMuyhmFwHLeqvn5rba2ZLUnfWNHWV9db7k733w8fhv46LlMcxzEMi/iIx+MEQYRCoVgshuN4Pp9Pp9PJZDIYDGIYRlF34rFYtrxEFut3qwLx59+LDJcqLtWfyZv2nteOJwAAwJMZKmwYQEBjGR4Sw1uO42zatru197tp2++dzc6ooY538n5z3z8dG/eOB/+C8Tft+j+gffpqyeG1/QAAAABJRU5ErkJggg==" nextheight="759" nextwidth="1080" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><hr><h2 id="h-the-status-quo-of-the-arbitrum-dao" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>The Status Quo of the Arbitrum DAO</strong></h2><p>In practice, wallets holding large voting power can determine who enters the Council. Entities like <strong>Entropy Advisors</strong> and <strong>L2BEAT</strong> together held (as of October 20) <a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://www.tally.xyz/gov/arbitrum"><strong><u>over 39.13 million votes</u></strong></a>. If either used their full voting power toward a single candidate, that would be enough to guarantee a seat. – <em>Today, unfortunately, </em><strong><em>L2BEAT</em></strong><em> has lost part of its voting power, standing at </em><strong><em>9.68 million votes</em></strong><em>. Still, let us analyze the snapshot from the moment of the event.</em></p><p>These delegates have consistently chosen to distribute their votes and not fully utilize their power, demonstrating responsible governance behavior. Unfortunately, this good practice is not enforceable. A malicious actor could accumulate $ARB or form alliances with large holders to influence outcomes, potentially gaining privileged access to Arbitrum’s most critical defense mechanism: the <strong>Security Council</strong>.</p><figure float="none" width="477px" data-type="figure" class="img-center" style="max-width: 477px;"><img src="https://storage.googleapis.com/papyrus_images/e29bc838d512ef96e2665a1afa7c56b19e6eae03b15f10820d0f3b53b1605943.png" blurdataurl="data:image/png;base64,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" nextheight="725" nextwidth="743" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><div data-type="twitter" tweetid="1895507162614382674"> 
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/paulofonseca__">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/7c098f2896fee925d4474053dbe540956eb84b31ceeddf2763f19e3ce2396595.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/paulofonseca__" class="twitter-displayname">Paulo Fonseca</a>
              <p><a target="_blank" href="https://twitter.com/paulofonseca__" class="twitter-username">@paulofonseca__</a></p>
    
            </div>
            <a href="https://twitter.com/paulofonseca__/status/1895507162614382674" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      <a class="twitter-content-link" href="https://twitter.com/arbitrum" target="_blank">@arbitrum</a> DAO is the biggest DAO in the world, whose delegates (entrusted to represent the tokenholders that delegate to them) actually control something valuable and useful with their votes on proposals. So of course, proper "vote-buying-as-a-service" would show up on Arbitrum
      
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/paulofonseca__/status/1895507162614382674" style="margin-right:16px; display:flex;">
            <img alt="Like Icon" class="twitter-heart" src="https://paragraph.com/editor/twitter/heart.png">
            8
          </a>
          <a target="_blank" href="https://twitter.com/paulofonseca__/status/1895507162614382674"><p>1:11 PM • Feb 28, 2025</p></a>
        </div>
    
  </div> 
  </div><p>It is also worth noting that <strong>Entropy</strong> could, in this situation, almost single-handedly reverse the outcome. Many might think, “Excellent, they would protect us,” while others would recognize that, in practice, for almost every scenario, they hold almost the <strong>final power of decision</strong> over what happens — or does not happen — within the Arbitrum DAO.</p><p><strong>We are not, in any way, questioning the integrity of the major voters and players, who are mostly builders and active contributors to the Arbitrum DAO. However, our position is that the ecosystem’s trustless foundation must be preserved to ensure the DAO’s long-term security and independence. Regardless of how responsible or reputable large delegates may be, the DAO’s resilience should never rely on individual behavior or discretion.</strong></p><hr><h2 id="h-why-this-was-done" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Why This Was Done</strong></h2><p>After conversations with several stakeholders within Arbitrum, it became clear that using LobbyFi in the Security Council election was perceived as a potential risk that had been largely overlooked.</p><p><strong>blockful</strong> purchased votes in the Security Council election through LobbyFi — something offered by the LobbyFi team itself. LobbyFi’s existence forces the Arbitrum DAO to think more deeply about its governance security and to raise its standards. Fortunately, their team is well-intentioned. But that is a matter of <strong>luck</strong>, and the ecosystem cannot depend on luck. Any other actor (whether on LobbyFi’s side or the vote buyer’s side) could act maliciously.</p><p>​​This post is accompanied by an extensive discussion within the Arbitrum DAO forum addressing vote-buying services, where community members debate their implications, transparency, and governance risk. For direct reference, see the thread:</p><div data-type="embedly" src="https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934" data="{&quot;provider_url&quot;:&quot;https://forum.arbitrum.foundation&quot;,&quot;description&quot;:&quot;Last weekend, hitmonlee.eth paid 5 ETH (~$10k) on LobbyFi for 19.3M ARB votes (~$6.5m) and all votes were cast for CupOJoseph. The purchase to 'vote for option 8' can be found here: LobbyFi has been active in the ArbitrumDAO for several months, but this is the first material example of someone willing to pay a significant amount (i.e., 5 ETH) to influence the outcome of an election.&quot;,&quot;title&quot;:&quot;DAO Discussion: Vote Buying Services&quot;,&quot;author_name&quot;:&quot;Arbitrum&quot;,&quot;thumbnail_width&quot;:1024,&quot;url&quot;:&quot;https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg&quot;,&quot;author_url&quot;:&quot;https://forum.arbitrum.foundation/u/Arbitrum&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Arbitrum&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:512,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAQCAIAAAD4YuoOAAAACXBIWXMAAAsTAAALEwEAmpwYAAACJUlEQVR4nK1UzWsTQRQf/AekeBPxnoZAJb2IVPDjUMGrePHkUfDQFk1sGxKwWm0j4s3/QA/9G6SHgoeqByEa7BcsaRO3H2t2d3Zm583sysxspptE0/jx4x1mZ97b35v3fm9Q3AEAYEIxCTEJ4z4IZYMBIBhwSkNtAaEMAMX/H1E6GXRiXv8CAIEOHO/vCjIMNhstZDve5t6BZTt2h4mBhFqw/hgAcSK34wW7+z+s1uFWw0YBobWdZt363jxyjYfV3P9Q2zCflIYAQvEm3Gbd2U9ODYHVOtpq2J5PEIBwvMD1CQOuPcrV10jh/IUJlWw0VDm6b0kow1JFXKrIkIeUyr6n8P5TLcD48tXJN29XRnP5B4W5kTNnny1VHxbmr1y7USiUSpWF5RevirOVUmXh+uRN3/eTFvIk3S6ZCs41QW40pwlWV9fq9Y1MNv986eXY+KXpmSI6dXq+/PjJ4nImm793f6r4qDw9U7x1+87TxWomm2+3j+us8Ys5eLe2PjZ+ESF07m4lDII/rU8vgZA9ZHoIMQkJk/f68m374+evcRwTBoRB28NGXQyAhbKrcgHAo4jqTeBqdLnqZSI0TKgmkBEMuOcT/VRoj4SSsvTj0dGMEJHUq1Buxghl6oFICFytIiMvHWmOU3IUQxZEcP236HiSXZ8MCoi6BK5mgqkXTabZk00/JMGhK+v7e49eBIRq07UeTEApQ+nshoGsVyQbkB7sATf4CYCJjWbL2IL0AAAAAElFTkSuQmCC&quot;,&quot;img&quot;:{&quot;width&quot;:1024,&quot;height&quot;:512,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>DAO Discussion: Vote Buying Services</h2><p>Last weekend, hitmonlee.eth paid 5 ETH (~$10k) on LobbyFi for 19.3M ARB votes (~$6.5m) and all votes were cast for CupOJoseph. The purchase to 'vote for option 8' can be found here: LobbyFi has been active in the ArbitrumDAO for several months, but this is the first material example of someone willing to pay a significant amount (i.e., 5 ETH) to influence the outcome of an election.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://forum.arbitrum.foundation</span></div><img src="https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg"></div></a></div></div><div data-type="embedly" src="https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934/24?u=blockful" data="{&quot;provider_url&quot;:&quot;https://forum.arbitrum.foundation&quot;,&quot;description&quot;:&quot;I've written extensively on the issue pertaining to the economics of DAO vote buying. While it predates the existence of LobbyFi It may offer some useful insights into the ongoing debate.&quot;,&quot;title&quot;:&quot;DAO Discussion: Vote Buying Services&quot;,&quot;author_name&quot;:&quot;&quot;,&quot;url&quot;:&quot;https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934?page=2&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg&quot;,&quot;thumbnail_width&quot;:1024,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Arbitrum&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:512,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:1024,&quot;height&quot;:512,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://forum.arbitrum.foundation/t/dao-discussion-vote-buying-services/28934/24?u=blockful" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>DAO Discussion: Vote Buying Services</h2><p>I've written extensively on the issue pertaining to the economics of DAO vote buying. While it predates the existence of LobbyFi It may offer some useful insights into the ongoing debate.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://forum.arbitrum.foundation</span></div><img src="https://storage.googleapis.com/papyrus_images/43a9aecf43c9c944351beb0031f896f43832fa62e10f91ed49b2f6e7caec5b9b.jpg"></div></a></div></div><p>As we stated in our forum post: <strong>we care deeply about the governance layer of the Ethereum ecosystem, and our goal is to protect DAOs... preferably with their cooperation.</strong></p><div data-type="embedly" src="https://forum.arbitrum.foundation/t/dao-discussion-governance-security-blockful-s-stress-test-using-lobbyfi-in-the-security-council-election/30106" data="{&quot;provider_url&quot;:&quot;https://forum.arbitrum.foundation&quot;,&quot;description&quot;:&quot;DAO Discussion] Governance Security: blockful's Stress Test Using LobbyFi in the Security Council Election Summary We are all aware of some possible governance risks, but they seem quite theoretical until someone takes action. Today we are taking action to show how feasible it is.&quot;,&quot;title&quot;:&quot;[DAO Discussion] Governance Security: blockful's stress test Using LobbyFi in the Security Council Election&quot;,&quot;mean_alpha&quot;:191.25,&quot;author_name&quot;:&quot;blockful&quot;,&quot;thumbnail_width&quot;:512,&quot;url&quot;:&quot;https://forum.arbitrum.foundation/t/dao-discussion-governance-security-blockful-s-stress-test-using-lobbyfi-in-the-security-council-election/30106&quot;,&quot;thumbnail_url&quot;:&quot;https://storage.googleapis.com/papyrus_images/31c11961ac6c2852080d8ebd8f8fa09693d3ddde0ee66b46606037d03aa72e62.png&quot;,&quot;author_url&quot;:&quot;https://forum.arbitrum.foundation/u/blockful&quot;,&quot;version&quot;:&quot;1.0&quot;,&quot;provider_name&quot;:&quot;Arbitrum&quot;,&quot;type&quot;:&quot;link&quot;,&quot;thumbnail_height&quot;:512,&quot;image&quot;:{&quot;base64&quot;:&quot;data:image/png;base64,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&quot;,&quot;img&quot;:{&quot;width&quot;:512,&quot;height&quot;:512,&quot;src&quot;:&quot;https://storage.googleapis.com/papyrus_images/31c11961ac6c2852080d8ebd8f8fa09693d3ddde0ee66b46606037d03aa72e62.png&quot;}}}" format="small"><link rel="preload" as="image" href="https://storage.googleapis.com/papyrus_images/31c11961ac6c2852080d8ebd8f8fa09693d3ddde0ee66b46606037d03aa72e62.png"><div class="react-component embed my-5" data-drag-handle="true" data-node-view-wrapper="" style="white-space:normal"><a class="link-embed-link" href="https://forum.arbitrum.foundation/t/dao-discussion-governance-security-blockful-s-stress-test-using-lobbyfi-in-the-security-council-election/30106" target="_blank" rel="noreferrer"><div class="link-embed"><div class="flex-1"><div><h2>[DAO Discussion] Governance Security: blockful's stress test Using LobbyFi in the Security Council Election</h2><p>DAO Discussion] Governance Security: blockful's Stress Test Using LobbyFi in the Security Council Election Summary We are all aware of some possible governance risks, but they seem quite theoretical until someone takes action. Today we are taking action to show how feasible it is.</p></div><span><svg xmlns="http://www.w3.org/2000/svg" width="24" height="24" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-link h-3 w-3 my-auto inline mr-1"><path d="M10 13a5 5 0 0 0 7.54.54l3-3a5 5 0 0 0-7.07-7.07l-1.72 1.71"></path><path d="M14 11a5 5 0 0 0-7.54-.54l-3 3a5 5 0 0 0 7.07 7.07l1.71-1.71"></path></svg>https://forum.arbitrum.foundation</span></div><img src="https://storage.googleapis.com/papyrus_images/31c11961ac6c2852080d8ebd8f8fa09693d3ddde0ee66b46606037d03aa72e62.png"></div></a></div></div><p>The Security Council is the most critical component of Arbitrum governance:</p><ul><li><p><strong>It protects users and the protocol through emergency upgrades.</strong></p></li><li><p><strong>It can veto DAO proposals, defending the ecosystem from governance attacks.</strong></p></li></ul><p>But this raises an essential question: <strong>Who secures the Security Council?</strong><br></p><blockquote><p><em>“But despite all of these important issues, there have been much fewer examples of outright voter bribing, including obfuscated forms such as using financial markets, that simple economic reasoning would suggest. The natural question to ask is: why haven't more outright attacks happened yet?</em></p><p><em>My answer is that the "why not yet" relies on three contingent factors that are true today, but are likely to get less true over time:</em><br></p><ol><li><p><em>Community spirit from having a tightly-knit community, where everyone feels a sense of camaraderie in a common tribe and mission..</em></p></li><li><p><em>High wealth concentration and coordination of token holders; large holders have higher ability to affect the outcome and have investments in long-term relationships with each other (both the "old boys clubs" of VCs, but also many other equally powerful but lower-profile groups of wealthy token holders), and this makes them much more difficult to bribe.</em></p></li><li><p><em>Immature financial markets in governance tokens: ready-made tools for making wrapper tokens exist in proof-of-concept forms but are not widely used, bribing contracts exist but are similarly immature, and liquidity in lending markets is low.” – DAOs are not corporations: where decentralization in autonomous organizations matters. (2022, September 20). </em><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://vitalik.eth.limo/general/2022/09/20/daos.html"><em>https://vitalik.eth.limo/general/2022/09/20/daos.html</em></a></p></li></ol></blockquote><hr><h2 id="h-do-not-look-in-the-wrong-direction" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Do Not Look in the Wrong Direction</strong></h2><p><em>"The fool looks at a finger that points to the sky.”</em></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/27547a958a2c38d60c5a30f8175aab37d9ccc2858b65b20fafbb0279f4eb2581.png" blurdataurl="data:image/png;base64,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" nextheight="239" nextwidth="500" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><br></figcaption></figure><p>During the event, we monitored the main Arbitrum DAO channels closely. Below I address several points that were raised and present a clearer structure for the conversation.</p><h4 id="h-1-the-necessity-of-the-action" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>1. The necessity of the action</strong></h4><p>As I noted above, difficult actions are often the price of necessary change. Regrettably, I did not see any other way to convene over 40 people in a Twitter Space, including qualified delegates, to reflect and deliberate on Arbitrum governance vulnerabilities. Despite numerous proposals and suggestions for improvement, no effective remedy had been implemented. With the normalcy bias broken, we must now address motivations, interpret what this action meant, and focus on the real issue: mechanism design.</p><p>It is worth highlighting the DVP quorum proposal, which pushes in the opposite direction of fixing present vulnerabilities. That proposal rests on the assumption that large delegates will always vote. That assumption is problematic in two ways. First, it presumes behavior without a mechanism to enforce it. Second, it effectively relies on the voting power of OpCo, which is also not a reliable safeguard for governance security.</p><p>We, at this point, are not <em>“messing around to prove a point”</em>.</p><p>The purpose was not to interfere, but to reveal how inexpensive and accessible it would be for a malicious actor to do so. Ignoring such a risk because it was exposed by a white-hat initiative would be short-sighted. Governance security must be tested as rigorously as smart contracts are audited.</p><p>Mainnet is not a playground, but it is also not a place where critical governance flaws should remain hypothetical until exploited. Understanding and addressing these risks is part of building a safer, more resilient DAO.<br></p><h4 id="h-2-a-governance-security-perspective-from-blockful" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>2. A governance security perspective from blockful</strong></h4><p>Because blockful’s core is security oriented, we approach this matter from a governance security perspective. Currently, the quorum for proposals is 3 percent for non-constitutional items and 5 percent for constitutional items. Given the votable supply, that equates to roughly 141 million and 212 million $ARB respectively. In value terms, reaching quorum for a proposal in the Arbitrum Treasury can cost tens of millions of dollars. With the Treasury holding significant liquid assets and over a billion dollars in $ARB, the cost to reach quorum is comparatively low. In 2025 the number of votes cast in Arbitrum proposals rarely exceeded 240 million, and in many instances did not reach 200 million.</p><p>Under the current proposal to consider roughly 50 percent of Delegate Voting Power as the quorum, we set the quorum to approximately 100 million and 150 million ARB. If we set the parameter to a value below the current suggestion, Arbitrum makes it even cheaper to reach quorum, potentially lowering the cost by around 30 percent. If it costs about 40 million dollars to reach quorum while the DAO holds more than 50 million dollars in liquid assets not denominated in ARB, then a financially rational attacker can profit from influencing governance.</p><p>We respect and admire the large delegates and acknowledge the work of OpCo and the Foundation to improve governance processes. However, if this conversation was not brought to light earlier, it is because the structural problem had not been sufficiently addressed.<br></p><h4 id="h-3-the-social-response-and-our-core-focus" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>3. The social response and our core focus</strong></h4><p>It is encouraging that the DAO mobilized quickly and that delegates coordinated a rapid response. Nevertheless, the event occurred and our focus remains on security. Social pressure is part of our remit. Some delegates, OpCo members, and Foundation representatives have every right to feel upset. I still believe it would be far more dangerous if a truly malicious actor had executed a similar operation. The most professional course of action now is to understand the core point. Whether one agrees with the approach or not, exposing the risk is something several actors have attempted over time.</p><p>As someone who has been part of this DAO for years, I do not consider reaching this point to be positive for the community. Upset or not, blockful stands ready to assist. Our objective is to fix the game, to stress test the system and observe how the DAO responds. This does not reduce our recognition of the delegates, the Foundation, or OpCo. Our goal is and will remain the protection of the Ethereum ecosystem.</p><p>Do not hate the player. Hate the game.</p><p>We are attempting to improve the game.<br></p><h4 id="h-4-about-the-seat-on-the-security-council" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>4. About the seat on the Security Council</strong></h4><p>We understand that blockful is now not seated on the Security Council. We will not attempt to solicit votes to reclaim a position. That said, if we were to obtain an additional 1.3 million votes, the situation could change quickly. Pantera Capital acted promptly and we appreciate that responsiveness.</p><div data-type="twitter" tweetid="1980425382483620227"> 
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/0xfishylosopher">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/ec94062248668af362efac08e410a25cd416cdf9e4481c2010355481963898ff.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/0xfishylosopher" class="twitter-displayname">Jay Yu 🐟</a>
              <p><a target="_blank" href="https://twitter.com/0xfishylosopher" class="twitter-username">@0xfishylosopher</a></p>
    
            </div>
            <a href="https://twitter.com/0xfishylosopher/status/1980425382483620227" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      We at <a class="twitter-content-link" href="https://twitter.com/PanteraCapital" target="_blank">@PanteraCapital</a> have just cast our votes for Arbitrum's Security Council.<br><br>Blockful is no longer in the Top 6 candidates for the security council.<br><br>As a former DAO researcher, I firmly believe that imperfect as they are, DAO integrity matters. And this Blockful election has 
      <div class="twitter-media"><img class="twitter-image" src="https://storage.googleapis.com/papyrus_images/64446850a3ed5a3cb12257b17a539e9f72d16c0d33c6611dc1125e7f76043754.jpg"></div>
      
      <div class="twitter-quoted">
        
  <div class="twitter-quoted twitter-embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/paulofonseca__">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/7c098f2896fee925d4474053dbe540956eb84b31ceeddf2763f19e3ce2396595.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/paulofonseca__" class="twitter-displayname">Paulo Fonseca</a>
              <p><a target="_blank" href="https://twitter.com/paulofonseca__" class="twitter-username">@paulofonseca__</a></p>
    
            </div>
            <a href="https://twitter.com/paulofonseca__/status/1980331131871609301" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      one seat in the <a class="twitter-content-link" href="https://twitter.com/arbitrum" target="_blank">@arbitrum</a> security council was just bought by <a class="twitter-content-link" href="https://twitter.com/blockful_io" target="_blank">@blockful_io</a> for ~5,400 USD via <a class="twitter-content-link" href="https://twitter.com/lobbyfinance" target="_blank">@lobbyfinance</a> to... prove a point basically! 
      <div class="twitter-media"><img class="twitter-image" src="https://storage.googleapis.com/papyrus_images/b892ea0354f6cf0f6769cd9c1125ad004265c223b594ad07bf14b54da7953ecc.jpg"></div>
      
       
    </div>
    
  </div> 
  
    </div> 
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/0xfishylosopher/status/1980425382483620227" style="margin-right:16px; display:flex;">
            <img alt="Like Icon" class="twitter-heart" src="https://paragraph.com/editor/twitter/heart.png">
            34
          </a>
          <a target="_blank" href="https://twitter.com/0xfishylosopher/status/1980425382483620227"><p>9:06 PM • Oct 20, 2025</p></a>
        </div>
    
  </div> 
  </div><p>This matter is not about the seat, nor about our conduct, nor about the individual work of contributors. It is about vulnerability at the level of mechanism design and incentives. The right discussion is not whether the seat is legitimate. The right question is how long it will remain extremely cheap to purchase votes and thereby challenge the legitimacy of DAO mechanisms.</p><h4 id="h-5-questions-that-go-beyond-one-seat" class="text-xl font-header !mt-6 !mb-3 first:!mt-0 first:!mb-0"><strong>5. Questions that go beyond one seat</strong></h4><p>Even when the code has been audited, we still need to test the social, economic, and governance layers. This action presents negligible downside in itself, given that emergency actions are protected by a 9 of 12 multisig. A damaging attack on the election would require control of multiple keys. However, there are many other scenarios to consider for the DAO as a whole.</p><ul><li><p>What if the governance front end is compromised? Currently, only one front end is being used.</p></li><li><p>What if an exchange holding a significant amount of ARB is hacked? How many tokens could flow into malicious hands and would the DAO remain resilient?</p></li><li><p>What if a set of new wallets holding substantial delegated power emerges immediately before an election?</p></li></ul><p>This is not the moment to concentrate on the workload generated by the response, on how service providers may be upset, on alternative ways the action could have been executed, or on the narrow legitimacy of the seat. The issue before us is far broader.</p><h2 id="h-closing-remarks-and-the-path-forward" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Closing remarks and the path forward</strong></h2><p>We must move the conversation from rhetoric to concrete mechanism design reform. Proposals and discussions must be translated into enforceable changes that preserve the trustless character of the ecosystem. That requires thinking in terms of incentives, coordination, redundancy, and timeliness.</p><p>To the delegates and contributors who have supported this constructive pressure, thank you. To those who disagree, I understand and share some of the frustration that incremental discussion has not yet produced practical outcomes. To those who reacted with personal attacks, professionalism and a focus on the central problem would better serve the community.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/f76cc0f3f4ce4493e5d51f35ce26384edf1985f8078bd7cf0165125b19ec7730.png" blurdataurl="data:image/png;base64,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" nextheight="320" nextwidth="1200" class="image-node embed"><figcaption htmlattributes="[object Object]" class=""><br></figcaption></figure><div data-type="twitter" tweetid="1980529917042520194"> 
  <div class="twitter-embed embed">
    <div class="twitter-header">
        <div style="display:flex">
          <a target="_blank" href="https://twitter.com/0xfishylosopher">
              <img alt="User Avatar" class="twitter-avatar" src="https://storage.googleapis.com/papyrus_images/ec94062248668af362efac08e410a25cd416cdf9e4481c2010355481963898ff.jpg">
            </a>
            <div style="margin-left:4px;margin-right:auto;line-height:1.2;">
              <a target="_blank" href="https://twitter.com/0xfishylosopher" class="twitter-displayname">Jay Yu 🐟</a>
              <p><a target="_blank" href="https://twitter.com/0xfishylosopher" class="twitter-username">@0xfishylosopher</a></p>
    
            </div>
            <a href="https://twitter.com/0xfishylosopher/status/1980529917042520194" target="_blank">
              <img alt="Twitter Logo" class="twitter-logo" src="https://paragraph.com/editor/twitter/logo.png">
            </a>
          </div>
        </div>
      
    <div class="twitter-body">
      yes, we appreciate the effort to bring this vulnerability vector to light! kudos to making the world of governance safer
      
      
       
    </div>
    
     <div class="twitter-footer">
          <a target="_blank" href="https://twitter.com/0xfishylosopher/status/1980529917042520194" style="margin-right:16px; display:flex;">
            <img alt="Like Icon" class="twitter-heart" src="https://paragraph.com/editor/twitter/heart.png">
            6
          </a>
          <a target="_blank" href="https://twitter.com/0xfishylosopher/status/1980529917042520194"><p>4:01 AM • Oct 21, 2025</p></a>
        </div>
    
  </div> 
  </div><p>Finally, we present these reflections not to "score points" but to catalyze reform. If we are serious about resilient decentralized governance, we must address mechanism-level weaknesses proactively and collaboratively.</p><p>Our goal is simple: <strong>raise awareness, initiate reform, and protect the DAO and its users from governance risks.</strong> </p><p>We are not acting against Arbitrum DAO; our purpose is to work with the DAO to strengthen its structures and improve governance security at the mechanism-design level.</p><p><strong>We remain open to discussion, improvements, and continued collaboration.</strong></p><hr><div data-type="callout" type="warning"><link rel="preload" as="image" href="https://paragraph.com/editor/callout/warning-icon.png"><div class="callout-base callout-warning" data-node-view-wrapper="" style="white-space:normal"><img src="https://paragraph.com/editor/callout/warning-icon.png" class="callout-button"><div class="callout-content"><div><p><a target="_blank" rel="noopener noreferrer nofollow ugc" class="dont-break-out" href="https://anticapture.com/"><strong>A N T I C A P T U R E  D A S H B O A R D</strong></a></p></div></div></div></div><br>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <author>blockful@newsletter.paragraph.com (danimim.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/943cb79093122d4aaad5f8c9829305f76723a1abcceb95f34eda91b838fa95ed.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[With Tally’s support, Uniswap DAO reached Stage 1 of gov security]]></title>
            <link>https://paragraph.com/@blockful/thanks-to-tallys-support-uniswap-dao-reached-stage-1-of-gov-se</link>
            <guid>HuNxeTwpzgUXuofyuvzw</guid>
            <pubDate>Thu, 21 Aug 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[In 2024, blockful audited Uniswap DAO governance with Anticapture.  A research around gov security was confirmed, and Tally helped address remaining DNS concerns.]]></description>
            <content:encoded><![CDATA[<p>In 2024, the Blockful team got a <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://uniswapfoundation.mirror.xyz/SAPBIdMcJpo_gUUyHdMNuH8r7qpCqRtxFbDrui7Na-I">grant from Uniswap Foundation</a> to audit Uniswap DAO governance using the <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://anticapture.com/">Anticapture</a> governance security framework. After economic and smart contract reviews, we were able to identify robust security measures and well-configured parameters in place. However, Tally’s domains were still susceptible to DNS attacks. Uniswap delegates do most of their voting through <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.tally.xyz/gov/uniswap">Tally</a>, and a compromised interface could render all security efforts useless and open the doors for a malicious proposal to sneak through.</p><p>DNS attacks are responsible for major losses across DeFi, and are one of the most overlooked risks in DAO governance. To close this gap, Tally helped to define and became the first to adopt Anticapture’s DNS risk reduction, <strong>enabling </strong><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://anticapture.com/uni"><strong>Uniswap to advance to Stage 1</strong></a><strong> in our security framework</strong>. The Tally team collaborated closely with our research team, providing critical input that helped refine this standard towards attainable milestones, ensuring governance interfaces are verifiably safe, as the contracts they interact with.</p><h2 id="h-how-dns-attacks-work" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>How DNS attacks work</strong></h2><p>The days of bank robberies are counted. In the past, it was common to hear about robbers stealing fortunes from financial institutions. Police chases. Gunfights. A fear for both service providers and bank customers.</p><p>With the digitization of life, money has also gradually become digital.</p><p>A super app has the power to grant loans, make payments, and hold investments for individuals and companies. All in the palm of each person's hand.</p><p>Nowadays, bank robberies don't happen by breaking into safes. They happen by breaking passwords, social engineering, and, often forgotten, <strong>attacking DNSs.</strong></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/34da85c401e5730f0fd9d47f3ab2059b6a58e8931c0486c64fe90a4426042a6a.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="834" nextwidth="1054" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>DNS, or Domain Name Service, refers to the domain of a person or entity. It is the gateway to getting to know a company and, sometimes, using the services provided by them.</p><p>When you use Amazon.com's DNS, you can be sure that you are interacting with applications and features that have been curated and approved by Amazon. Your trust in the company allows you to make a credit card payment without fear of it being cloned.</p><p>But a DNS isn't fault-proof. The owner needs to take security measures to protect their DNS, preventing attacks that could harm all users relying on their services.</p><hr><h2 id="h-dns-attacks-and-defi" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>DNS Attacks and DeFi</strong></h2><p>There are several types of DNS attacks, <strong>the most popular being DNS spoofing and </strong><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://en.wikipedia.org/wiki/DNS_hijacking"><strong>DNS hijacking</strong></a><strong>.</strong> Both <strong>aim to deceive people by directing them to a fake domain</strong> that looks like the real one in order to steal personal data, money, and whatever else they can.</p><p>This type of attack, focused on DNS, has been common in the market for years.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/27fdf92a8eacdae1e6d2ff4b5b136e98ce7f4c8a6946b36e9ea1ca80ac66fd8d.png" alt="Transactions involving the attacker to Badger DAO. All stolen tokens were converted to BTC using bridges." blurdataurl="data:image/png;base64,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" nextheight="704" nextwidth="1262" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Transactions involving the attacker to Badger DAO. All stolen tokens were converted to BTC using bridges.</figcaption></figure><p>DeFi protocols have always been the main target of this type of attack in the web3 context. Projects with tens of millions of dollars in smart contracts, many far beyond the reach of any agency or state.</p><p>What keeps them going are their developers and users, with the guarantee of audits by competent and reputable security companies. Trustless contracts, with no intermediaries or managers, are still interacted with through websites that are often the weakest link in their security chain.</p><p><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.trmlabs.com/resources/blog/trm-investigates-badgerdao-defi-protocol-hacked">The attack on Badger DAO (2021)</a>, one of the largest in the market’s history, took $120 million from its users. The reason: a vulnerability in its front-end, specifically in its DNS. In this case, the hacker directed users to a fake website, leading them to approve an interaction with a contract, which allowed their money to be drained from the protocol's pools.</p><p>Other relevant DeFi protocols have suffered DNS attacks:</p><ul><li><p><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://convexfinance.medium.com/post-mortem-of-events-june-23-3d6db955dc7d">Convex</a> (2022): Convex's DNS host (Namecheap) was compromised, allowing a hacker to access it and direct its users to a malicious contract. The same attacker replicated the attack on Ribbon Finance, DefiSaver, and Allbridge</p></li><li><p><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.theblock.co/post/251970/balancer-dns-attack-frontend">Balancer</a> (2023): $238K was stolen after Balancer's DNS was stolen.</p></li><li><p><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://mirror.xyz/0xdc519466f1cda17e8ae6735bB8652F47c0533CBe/2LzzrSSD5vcaTBPmcpOax7vZRYQNfDpYwDzqM3SydY4">Curve</a> (2025): Hackers took over Curve's DNS, redirecting users to another page capable of draining funds from users' wallets. $570K was stolen in this attack.</p></li></ul><p>Recently, the strategy for DNS attacks has changed. Instead of attacking well-known DeFi protocols, attackers are looking for projects that have closed their doors and no longer maintain their domains.</p><p>This way, all you need to do is buy the domain of a “dead” protocol and trick its former users into interacting with it in order to steal from them.<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.coinspect.com/blog/zombie-dapps/"> It is estimated that there are more than 475 applications in this situation, and 90 have already been targeted by hackers.</a></p><p>While DeFi protocols are a target for DNS attacks, there is another sector running the same risk: the governance of DAOs.</p><hr><h2 id="h-potential-dns-attacks-in-governance" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>Potential DNS Attacks in Governance</strong></h2><p><strong>In DAOs, votes can decide the future of organizations</strong>. While votes can be cast directly in the contracts, they are usually carried out on an interface maintained by third parties, hired to provide a secure and practical voting tool for the DAO. Examples <strong>of service providers are Tally, Agora, Lighthouse, and Aragon.</strong></p><p>These interfaces serve to facilitate interaction with the DAO's governance contracts. A delegate or holder of a governance token does not need to interact with the Governor: they simply click buttons to vote Yes, No, or Abstain, and leave their justification for their vote.</p><p>However, as intermediaries, interfaces become a risk vector for the DAO. A simple change in a governance front-end can cause disastrous results in the governance of a DAO.</p><p>This could become one of the best risk/return attack strategies in DAOs, especially in on-chain governance. DAOs like Uniswap, Arbitrum, Compound, Nouns, and ENS DAO depend on the quality and robustness of those interfaces for their members and delegates to cast their votes, delegate voting power, and keep track of what is going on with the system.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/64f77abac407b9c571be61d0f1dd52c9b52e1c73005c5ca736defc09bdfb4f22.png" alt="Humpy and the Golden Boys managed to get the proposal approved without resorting to other subterfuges. But with a DNS attack, the 633,636 votes against could be turned into votes in favor." blurdataurl="data:image/png;base64,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" nextheight="922" nextwidth="1202" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Humpy and the Golden Boys managed to get the proposal approved without resorting to other subterfuges. But with a DNS attack, the 633,636 votes against could be turned into votes in favor.</figcaption></figure><p>In July 2024,<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://mirror.xyz/research.blockful.eth/v0GEP49oXP1gzMDlyP91-S4XIa8PIOd0vKq-6R8f54I"> Compound had its governance captured by Humpy and the Golden Boys</a>. Addresses bought millions in $COMP to approve a proposal that released money to the “attackers.”</p><p>If they wanted to improve the chances of the attack, they could’ve tried to attack Compound's DNS and create an identical voting interface, with minor changes in the background to trick the defenders into voting in favor of the proposal while they think they are rejecting it. It is a type of attack that would not need to affect delegates/voters individually, but would be able to drain a DAO's treasury. This attack vector is more technical, <strong>but comes at a lower cost than capturing a DAO by buying governance tokens.</strong></p><p><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://anticapture.com/uni">The Anticapture</a> team is aware of <strong>this potential vulnerability in governance.</strong></p><p>When analyzing the security of a DAO, one of the elements analyzed is the ability of someone to attack the organization's DNS or its voting interface providers. It is one of the criteria for a DAO to advance to a higher security stage.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/65e57d52fa2fed1cdbf5f0f4fa19a3098eb25293eebb6c8c1a88a8af6bf8a0b5.png" alt="anticapture.com" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAPCAIAAAAK4lpAAAAACXBIWXMAABYlAAAWJQFJUiTwAAAC5UlEQVR4nJ2R2W7TQBSGjUogUaZ2bMee2J5Mxp7xlq2Js0xInEAoTSm0DUUVF3BRxDuwSlxzw+OwCJUrQOKi4pmMnLAUioBW+nR05uif84/+ESRRIYQiVDFNbBhIljXDQKZulnQDlxAxyyKQMpn8mREgtGazG1tb2/P53s7OvNls9/loxkejZufO6PLBdL1i4YKsa5qhqhBCS5Y1VS2pakmWte89VFUoy3BxTHtNS+tSIzjUb7V4EKxVq23XrVvIhhDppbJhVkqWXSyVy9jBKTbGjuuGCNmOwxCyFxObUo8QirFDSDokhGHsLASVpUxQ1aJdsTAyKhhZJtRVBWoq1JQlhp7WbBbkcnIuJ2Yy+VxOXAJAYdlczKb8lkw2C5ZigRJ4b8fbv87u73k7U9pv4EsR+Y59KSKbY6rIEiY0Hk04H45Gkzi+MplcvXlz3uvyusPqzJNEZSWTO+kBQEHQjVI4CP2+Hw4CvxuwBrMD+zi0zlZFyTIJ56Mo4q1Wt9XqRdHA86quG3gLKPVcN6TUJ4RR6jsO87wqISw10JDJpj06brH1rneds0nHCl2r9hPC62JBhrphL1LGOA2aECqJCgAFSVT+jKRJopJGlBrEazRulhue6TpWQK2QHacSBZJSXMnkHer2egPOh5pmCML5H5/xdwQNW/6046/37H4dhaxcc3/D7tdWFRUWiqEb1BpRs9k2TXz8t/9lgEz3SofwuhmwNJwTVLrVvKg4lt4OvWo9iiJ+OgMdW+F6z4/XSJU5NfcktB1IigbAKgCrizvyhcx/rf5mgFFxa4quxWg6xs2G4XnQ93+h0zZkWc5eWG4/NQL33Rd3t57vz57f3niyO3u4vfFoe+Px9sbT3c2nu5vP5puPdq9RC61k8vmzGby8tZ98+Ji8fp0cHibvD5M3r5J3b5PPn5Kjo+TLUVoP3+11h8K5LADSWQyq2HkQj+8PxwfD+GBwAh7f6Q2QblzMnuX5ABS+AiVjsiKlsk6vAAAAAElFTkSuQmCC" nextheight="552" nextwidth="1194" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">anticapture.com</figcaption></figure><p>We start from our framework for analyzing a DNS, <strong>defining different risk profiles for DAO domains:</strong></p><ul><li><p>🔴 <strong>High Risk:</strong> A domain without any protection, such as DNSSEC, DANE, TLS, and CAA records, is considered high risk. It can easily be captured by an attacker, redirecting delegates/voters to a fake platform.</p></li><li><p><strong>🟡 Medium Risk:</strong> Fit to web2 standards, with DNS protections, but a changeable, centrally managed interface. The domain follows DNSSEC, DANE, TLS, and CAA standards, but does not have a provably immutable platform approved by the DAO.</p></li><li><p><strong>🟢 Low Risk:</strong> A DNS with DNSSEC, TLS, DANE, and CAA records, with an immutable domain verified by the DAO and verifiable on access.</p></li></ul><p>The actions to reach a Low Risk level are complementary, meaning that it is not enough to have a domain registered on-chain: <strong>you must have all the DNS protections that precede it.</strong></p><p>Our Medium Risk classification takes the best of web2 security practices and demands that providers of governance interfaces are at least at that level. However, this is not sufficient to claim the risk is at its minimum, as evidenced by the ByBit + Safe incident this year. Even with proper DNS security, a domain can be compromised if a team contributor is compromised.</p><p>For Low Risk classification, the voting platform needs to be audited or approved by the DAO, then made immutable and hosted through a resilient system. This could involve using IPFS, eth.limo, SRIs and hashing of the files to create proofs against code tampering. We are not aware at this point of any interface that would fully comply with those requirements, but Tally’s “<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://docs.tally.xyz/tally-features/tally-zero">Zero</a>” interface is the best example of work towards that goal.</p><p>In our work with Uniswap, we identified a lack of “proof of protection” in Tally’s domain, making it a possible target for DNS spoofing or hijacking.</p><p>Our security definitions and Tally’s prompt action have made the DNS of many of the market's leading governance systems more secure.</p><p>Since it provides a voting interface for multiple organizations, it is responsible for projects such as Arbitrum, Uniswap, and Compound. The governance over billions of dollars can be accessed through its interface.</p><hr><h2 id="h-dns-attack-mitigation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0"><strong>DNS Attack Mitigation</strong></h2><p>Aware of this risk, Tally’s team has heard our worries and stepped up, helping us define security metrics for Anticapture's DNS framework, enabling us to elevate Uniswap to Stage 1.</p><p>⚠️ Unsupported element removed</p><p>The Tally team worked closely with ours, contributing to refine the implementation from start to finish. Their collaboration was key to creating a standard that strengthens security for all DAOs, and that coming forward will define the base level of how we expect other governance platforms to define their domain security.</p><p>In doing so, Tally also demonstrates to the market the importance of concern for the security of governance front-ends. It sets a precedent for other providers of the same service to seek updates to protect their customers/DAOs from potential vulnerabilities in voting.</p><p><strong>Now, this security standard is available not only to Uniswap, but to all DAOs compatible with Tally.</strong></p><p>Check this out: <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://anticapture.com/uni">https://anticapture.com/uni</a></p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/77bdeeb227b6cac0006d00dd996c6be4309a3709e1492b4120d12c0c7ed78e4b.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="936" nextwidth="912" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Tally is leading the way in improving DNS security.</p><p><strong>We are looking forward to connecting with other governance providers</strong> to verify their security setup and help them make it publicly available to users so that it can be easily checked before voting by all security-aware delegates and members.</p><p>We are happy to contribute to the security of the DAO ecosystem and help Tally, as well as Uniswap and all other DAOs they support, offer more secure systems to their users.</p><p>Congratulations to the Uniswap DAO and all its members for reaching Anticapture Stage 1, by working towards improving its resilience, securing its treasury, and protocol preemptively!</p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/788d51c0562f76de301fed1bc06a74995ee74a9897dc441a257e3cbab226d456.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[A hidden threat to ENS: Uncovering and solving a major governance risk]]></title>
            <link>https://paragraph.com/@blockful/a-hidden-threat-to-ens-uncovering-and-solving-a-major-governanc</link>
            <guid>0g8v74LgJJCOHC6dzAYO</guid>
            <pubDate>Sat, 12 Oct 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[“Security is always excessive until it’s not enough.” — Robbie Sinclair.  Even foundational protocols face risks; in March 2024, we uncovered a major flaw.]]></description>
            <content:encoded><![CDATA[<blockquote><p>Special thanks to Avsa, Spence, Guiriba, Zeugh and Danimim for discussion and review throughout the whole process.</p></blockquote><p>It's widely recognized that ENS is vital as the backbone of decentralized identity and enhanced UX on Ethereum. It's one of the most impactful and sustainable organizations while also strongly funding public goods.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e9307cca57b40ba5696a098490a5d158529d45e7716ada30fd1bbfadd97b01fd.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAJCAIAAADcu7ldAAAACXBIWXMAAAsTAAALEwEAmpwYAAACZUlEQVR4nJ2QTUgUYRjH32Md81QRRNfSQlfUyBTXD3JkC9RdUaqxIs2ddmZdP2ZJF3ddXaeD0Lviwd2VOWzkRXAOozDavtiQO+IXb+IHDe6hFolopd3LEgPthK6QdKn8HR6ew5/n9zwP+BzfBwBA/zhCkU6Hg+f50GSobWj8y0FS1/WfmYx+KjRN+55MapoGzoIz4Ij7ra0AgEuXr5y/cBFcK5uRIrqe0f6H7Nxsk06n92KxH5oGRoaHAACG/Lyv3xLvl5TllZVIBCG0sLK6errdT3J4QSqV2sAfIIQv+vpGR0d7untcLteYf8zj8fhGfMFg0EbbO6zW0GRIUZRBr5fjOBtNM4w9HA4LggAhZFknw9gDgYAoivwR09PTvwVvpqYazOaim7fKq6oJ0718Q+HVvBv1jY11prvVdwiCIM7l5OTmXqeo54Ig2Gi7jaYLDIVmi4Vl2a6u7g6r9cFD0mis6nQ4IIQDA+5e1hkIBHQ9cyzYTxygVfwOb0V31ejmzk58f2nr49ru3uanuIiW52amJoITyUQim9b/xh+ZQ8HC/Hx/v4vjXkII/f4xjuN8w75elh30eu0OB0VRbreH4zie5xnGzrLOp21tJEmazeZHj5+0tLSQJPkKwlqizu12UxTFMAzLOtvbnwmCcCyAEBYXl9housJYabE0lZaWFRWXVBgrCwyFJpOpqbm5uqamwmi8XVZeS9TV1zcghBZlORx+vRSNvo1EFmV5A+PZ2bnt7R1ZljHGa2vrkiSpqnosiMfjCCFFUeQjRFEUBGED40VZVlUVYyxJkqIo2boXi/3Lo06+6BfjkmZ6XZbv/gAAAABJRU5ErkJggg==" nextheight="216" nextwidth="745" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Given ENS's critical role in the ecosystem, ensuring its security and stability is paramount. However, even such foundational protocols are not immune to vulnerabilities. In March of 2024, we uncovered a critical vulnerability in ENS DAO's governance that could have led to a <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://dune.com/steakhouse/ens-steakhouse">~$150M theft</a> and protocol capture. This wasn't just a theoretical risk—similar attacks have already crippled other DAOs.</p><p>While often touted as fair, the '1 token, 1 vote' model tends to concentrate power based on wealth. In many DAOs, the top 15 holders usually control over ~50% of voting power, creating an oligarchic structure rather than a decentralized one. Low participation rates further compound this issue, making hostile takeovers dangerously easy.</p><p>An investor who can measure the average participation percentage and the quorum needed to approve a proposal can buy the necessary amount of tokens (that being the <strong>most capital-inefficient option</strong>) on the secondary market and pass a proposal that only benefits himself - capturing it and bringing it to its end.</p><p>With the Security Council, ENS is protected from this risk, giving time to the DAO to improve delegation and security healthily. Now, let's explore the research and collaborative work that led to this security enhancement.</p><h2 id="h-why-capture-a-dao" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why capture a DAO?</h2><p>The motivation for attacking a DAO is obvious: to make money. However, more motives or ways exist to extract value from the capture.</p><h3 id="h-gradual-value-extraction-slow-rug" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Gradual value extraction (slow rug)</h3><p>The attacker doesn't steal the treasury from DAOs but gains the power to manipulate organizations in his favor. It's a vampirizing strategy that aims to keep the protocol and DAO living while extracting profits for months/years. It demands a deep analysis and planning from the attacker; it's an attack that considers the mid-term success for being profitable but doesn't align with long-term values.</p><h3 id="h-metaprotocol-attack" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Metaprotocol attack</h3><p>Well-known examples of such cases can be found in projects using veNomics, such as Curve and Convex or Balancer and Aura. Today, the duos have synergies, but the main idea was to carry out vampire attacks on dominant projects in their respective sectors.</p><h3 id="h-competitive-takeover" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Competitive takeover</h3><p>In traditional markets, firms compete for market share through marketing, customer acquisition, legal actions, and patents (sounds familiar, huh?). In the DAO ecosystem, this competition can be far more aggressive and direct. The governance mechanisms of DAOs, relying on code and market conditions, create unique vulnerabilities.</p><p>Attackers can exploit governance systems to seize control of competing protocols, often anonymously. This makes traditional legal recourse challenging, if not impossible. The result? A swift, potentially irreversible loss of market share for the targeted DAO.</p><h3 id="h-direct-treasury-raid" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Direct treasury raid</h3><p>When a DAO's non-governance token treasury exceeds the value of all delegated tokens, it's a more straightforward and immediate profit opportunity.</p><p><strong>ENS was highly exposed to this type of attack, which was the most concerning and obvious attack.</strong> Let's expand on that.</p><h2 id="h-past-cases" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Past cases</h2><p>To ground our research in practical reality, let's examine a few notable incidents that illustrate the vulnerabilities we've discussed.</p><p>These case studies provide concrete examples of how theoretical attack vectors have been exploited in practice, offering valuable insights into the real-world risks faced by DAOs and the importance of robust security measures.</p><h3 id="h-case-study-compound-gradual-value-extraction-attack" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Case study: Compound - Gradual value extraction attack</h3><p>Looking at the <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://compound.finance/governance/proposals/289">attack on Compound</a>, we realize that the pessimistic scenario is more real than it seems. Humpy, a famous attacker whale, bought 682K COMP (<strong>6% of token supply</strong>, ~U$34M at the time) to pass a proposal that would give them more 5% of the token supply as voting power, effectively capturing the organization.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/045d97eab17daf674c753b40fb166033fd2fc6112a376865907d5a37b9d72178.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAOCAIAAADBvonlAAAACXBIWXMAAAsTAAALEwEAmpwYAAADJUlEQVR4nH1T32/TVhi1S0jrJA39ITZpD5sQ0E5sUlWSxkmaLM3ouq6b2B72P6BJe9k0xBOIP6BIe9gbBSHQECsPdDR2xhv7V0bjhDa2Y99r+zq+373IdkmylnJ0ZF1/Pr7fOZ+vhbn5z3K5Yqlck0vVhYX8Yk5erqzIxepiTs4XyoViJbdUkkvVy3m5XFmp1b+qr65vfHt1aubD5MTkROrMgFJ6KpFMX5i7tLq2ce78/PmLn16YuzRz9iPhk4vzpa/XCpVafXW98kW9uLxSq68tV+vV2pcFuZJfKufyxcVc8fOFnFyq5gvly/niklzJZGel9FQqMz1gJjsrjo1/9/2Pm7//sb7xw8qVb66sX/343LyQyGTHPphOpNLj0qSUmUplZ6XJGWlyVkplhRBiTFFIhAvxlCiOCaIonhoXwsooTwvC6UQynUimk1JWSk9PpM4kpazwy6/X1V119+/dpvpCVVSloaoNRWkoiqKq/7yIqajNh4/+3G0ov12/cfPW7eeq+ujxk0bz8GnIZqhR1GYjfK35bGfn3v0Hz3aeX/vpZ+Hu3S3g3O/3+ckAgJbWpsC2tu5tbz/tO2771R5j7CQ98f3/9loAbHPzjqCoTc75vmvqxB6l2yc0+B8454rafPnyX855YJrEOKSvG76NAjqU0wic87+2nwqc834/ICSsvz8E8Q9TegF1/X5A4T16SimJpiJQCthxepZlI0SBMs4GHEYmxDR7COHYGkLYNE3LsmgQDOUjcF1PNwzHcSgFAYA5UQOEEMC7TXmeZxhm5AAoAMLYNK2eZQXRHI7Ddd2urmPHAQgbgOt6lmUZhul53gkNiGn27MgBALMRMgzTsu140MfRsyzdMDF2AFjYwPM8hDDGTv/tWTpyQnzftxEKI0cNMHYsy8YYDxIf0WMnFHgeiROwXs/S2h2t0yGEHPHCoqtuGK9aWrerAzAAOOjqWrvTeb1PiH/cPmNs/+Bgr6V1dZ0xFn7kuBojXtsIuSPjGjyNExzRAwBCaNTcUE9BCCiNb+AtKYDWbnde74fbRZUBwsNOh4VwFf2kLU076HYHO4zq3wAtbwgNAcyBcQAAAABJRU5ErkJggg==" nextheight="833" nextwidth="1874" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><strong>Only 56.36%</strong> of the delegated votes were used in the vote that captured Compound, <strong>taking into account the attacker's tokens</strong>.</p><p>The proposal ended up not being executed, <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://mirror.xyz/research.blockful.eth/v0GEP49oXP1gzMDlyP91-S4XIa8PIOd0vKq-6R8f54I">here</a> is an analysis we did while the attack was happening to support the Compound community.</p><p>Similar cases were done by the same attacker: <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://messari.io/report/governor-note-the-vebal-wars">Balancer</a>, Sushi, Cream finance, Badger DAO.</p><h3 id="h-case-study-aragon-direct-treasury-raid-attack" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Case study: Aragon - Direct treasury raid attack</h3><p>The RFV (risk-free value) raiders, a group that attacked several DAOs and was even backed by a hedge fund named Arca, attacked Aragon.</p><blockquote><p>Simply lining up soldiers doesn’t mean an attack’ — Jeff Dorman, Arca</p></blockquote><p>Passing a proposal to split the treasury among token holders. At the first moment, the Aragon Association (AA, the Swiss non-profit behind the project) vetoed the proposal, but after some months and a lot of pressure, they decided to split 86% of the treasury (86k ETH). Not satisfied, Aragon DAO members threatened AA with a lawsuit.</p><blockquote><p>‘Their goal is to target treasuries and manipulate the price of tokens for financial gain, at the expense of the organisation’s mission’ — The Aragon Association</p></blockquote><p>Similar cases were done by the same attacker: <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.theblock.co/post/76453/arca-gnosis-defi-project-call">Gnosis</a>, <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.dlnews.com/articles/defi/rebel-investors-say-hector-network-is-slow-rugging-them/">Hector Network</a>, Tribe (FEI), Rook</p><h2 id="h-cryptoeconomic-analysis" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Cryptoeconomic analysis</h2><p>The <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://dune.com/avsa/governancerisk/502ed0cc-d9e7-4b63-93e8-ac36ea50e5b1">following chart</a> illustrates the relationship between ENS DAO's total assets (excluding the native governance token) and the value of delegated ENS tokens over time:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/e60e908a595b70c49fc7ba1ee973ffb74fdc2ef40c1224284ec39c4564a20b72.png" alt="Source: Dune Analytics by @avsa" blurdataurl="data:image/png;base64,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" nextheight="786" nextwidth="1404" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Source: Dune Analytics by @avsa</figcaption></figure><p><strong>Key observations:</strong></p><ol><li><p><strong>Treasury Value Exceeds Delegated Tokens</strong>: Since March 2023, the value of ENS DAO's treasury (excluding the native governance token) has consistently surpassed the total value of delegated ENS tokens. This imbalance creates a potential incentive for attackers.</p></li><li><p><strong>Significant Exposure</strong>: At its peak, the disparity reached nearly 3x, meaning the treasury was worth almost three times the value of all delegated governance tokens. This scenario presents a highly attractive target for potential attackers.</p></li><li><p><strong>Price Volatility Impact</strong>: The substantial fluctuations in the delegation value were primarily driven by ENS token price volatility rather than changes in delegation patterns.</p></li><li><p><strong>Insufficient Safeguards</strong>: Even significant initiatives like the introduction of veto.ensdao.eth, which doubled the number of delegated tokens overnight, was not enough to fully mitigate this economic imbalance.</p></li></ol><p>This gap didn't change if analyzing the current state. For exposing the state of ENS governance without the research and action towards security, the chart and statements below aren't considering <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://discuss.ens.domains/t/introducing-veto-ensdao-eth/19088">veto.ensdao.eth</a> neither <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://discuss.ens.domains/t/temp-check-enable-cancel-role-on-the-dao/19090">securitycouncil.eth</a>, which are outcomes from this research.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/6be13be49b0e92d9bd3644cb94cda4e21ce0dea8660bfb185f2efb0c5838d516.png" alt="Current state of ENS' governance economics (Oct/24)" blurdataurl="data:image/png;base64,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" nextheight="697" nextwidth="1285" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Current state of ENS' governance economics (Oct/24)</figcaption></figure><p><strong>Liquid treasury</strong>&nbsp;here means assets that are not ENS, the governance token, since if it is attacked, its value will decrease, and it's not profitable to attack the DAO (considering a direct treasury raid). ENS DAO today holds ~$120mi in USDC, ETH, and DeFi positions that are managed by <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://reports.karpatkey.com/ens">Karpatkey</a>.</p><p><strong>Delegated cap</strong> is the value of all the delegated tokens. This means that the DAO has $65mi in "organic" delegation protecting the treasury, considering all delegated tokens engaging in the votes, which is unrealistic.</p><p><strong>Average quorum</strong> is a more reasonable metric to understand an aproximate cost of passing a proposal. Which currently is around 1.4m ENS, therefore ~$24mi protecting the DAO.</p><p><strong>Other mechanisms</strong>&nbsp;for lowering the cost of the attack must be considered since&nbsp;<strong>all you need is delegation</strong>&nbsp;and not the token itself.</p><ul><li><p>A campaign could be run, giving a high APY for token holders delegating for an address. It is a no-brainer since, at first moment, it looks like a low-risk operation for yield. This is explored a lot in veNomics and DeFi, where you have bribe markets and similar mechanisms.</p></li><li><p>Borrowing tokens is also an interesting instrument since the attacker has less skin in the game or can even use it as a short position.</p></li><li><p>CEXs also allow you to short the token on the futures market and leverage, lowering the cost of attack.</p></li><li><p>Proposal to split treasury with who votes yes. This one is the most dangerous, since delegation doesn't means economic skin on the game, this can create incentives enough to collude with the attacker.</p></li></ul><p><strong>Unknown whales</strong> are a huge risk and it's not something theoretical. <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://etherscan.io/address/0x245445940b317e509002eb682e03f4429184059d#tokentxns">This</a>&nbsp;address has been buying ENS for&nbsp;<strong>more than 450 days</strong>, now surpassing 2M ENS, passing the average turnout alone by 600k, and being probably only one of the wallets it controls.</p><h2 id="h-governance-implementation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Governance implementation</h2><p>The security of a DAO is heavily dependent on the specific details of its governance implementation. In ENS's case, two critical aspects of the implementation significantly increased its vulnerability to attacks:</p><p><strong>Minimal Proposal-to-Voting Delay</strong></p><ul><li><p>The delay between proposing and the start of voting is only 2 blocks.</p></li><li><p>This brief interval provides the snapshot for determining the voting power of delegates.</p></li><li><p>Such a short delay leaves little to no time for the community to react to potentially malicious proposals.</p></li><li><p>Attackers can sell their governance tokens immediately after voting, minimizing potential losses as the malicious proposal's information hasn't yet spread widely.</p></li></ul><p><strong>Ineffective Cancellation Mechanism</strong></p><ul><li><p>The existing structure lacked an efficient way to cancel malicious proposals in the timelock.</p></li><li><p>Any attempt to cancel would always lag behind the execution of a malicious proposal.</p></li><li><p>This effectively meant that once a malicious proposal was set in motion, it was nearly impossible to stop through existing governance mechanisms.</p></li></ul><p>These implementation details created a perfect storm of vulnerability, making ENS an attractive target for potential attackers. They underscore the importance of carefully considering every aspect of governance implementation, as even small details can have significant security implications.</p><h2 id="h-taking-action" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Taking action</h2><p>After completing our initial research and confirming the attack's feasibility, we promptly disclosed our findings to the Metagov stewards and Nick. Our primary goal was to create an emergency protection mechanism for the ENS DAO.</p><h3 id="h-short-term-solution" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Short-term solution</h3><p>ENS Labs acted swiftly to implement an immediate safeguard:</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/04451db3d617d98efebdb387cd24f0c6f935ca148214411fe07cd08ed13a24aa.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="795" nextwidth="2314" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><ul><li><p>Contributors delegated 4.18M tokens to <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://etherscan.io/address/0x552DF471a4c7Fea11Ea8d7a7b0Acc6989b902a95">a contract created by Nick</a></p></li><li><p>This contract acts like a 1/5 multisig setup to only vote "Against" on harmful proposals</p></li><li><p>As mentioned in the cryptoeconomic analysis, this was not enough to fully mitigate this economic imbalance, but created a higher barrier.</p></li></ul><h3 id="h-developing-a-mid-term-solution" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Developing a mid-term solution</h3><p>While the short-term solution provided immediate protection, we worked in parallel on a more sustainable safeguard: the Security Council. This mid-term solution doesn't rely on economic conditions to protect ENS DAO's governance.</p><p>After extensive discussions and research, we designed an implementation with key features:</p><ul><li><p>An intermediary contract limiting the council's power to veto only</p></li><li><p>A two-year expiration to prevent permanent centralization</p></li><li><p>Council composition based on jurisdictional diversity, economic and reputational stake, and historical participation</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/325d7dcab3477920fd040d05a007daea52ae8237e6ec08c69151f55897e102e4.png" alt="Cycle of a malicious proposal" blurdataurl="data:image/png;base64,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" nextheight="918" nextwidth="2704" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Cycle of a malicious proposal</figcaption></figure><h3 id="h-implementation-process" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Implementation process</h3><ol><li><p>A <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://snapshot.org/#/ens.eth/proposal/0xf3a4673fe04a3ecfed4a2f066f6ced1539a5466d61630428333360b843653c54">temp-check voting</a> was submitted, which was approved unanimously, demonstrating the community's understanding of the initiative's importance.</p></li><li><p>Established <strong>the council multisig</strong> as a 4/8 multisig, with members <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://snapshot.org/#/ens.eth/proposal/0xa0b1bfadf6853b5b0d59d3c4d73c434fc6389339887d05de805361372eb17c3a">approved by the ENS DAO</a>.</p></li><li><p>Rigorously tested and reviewed the Security Council contract:</p><ul><li><p>Audited by 4 external auditors we had previously worked with</p></li><li><p>Additional review by ENS DAO community members</p></li></ul></li><li><p>Submitted the <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.tally.xyz/gov/ens/proposal/42329103797433777309488042029679811802172320979541414683300183273376839219133">executable proposal</a> with caution and extensive testing, as it granted the PROPOSAL_ROLE to a contract, enabling proposal and cancellation of timelock operations.</p></li></ol><h3 id="h-operational-considerations" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Operational considerations</h3><p>We also conducted operational work to enhance the Security Council's effectiveness:</p><ul><li><p>Defined best practices for the council's operations</p></li><li><p>Benchmarked and researched methods to maximize wallet security for the multisig</p></li></ul><h2 id="h-next-steps" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Next steps</h2><p>A security council should not be a long-term solution, it's a tool for giving us time.</p><p>Participation is still far from ideal, and the number of delegates is at its <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://dune.com/karpatkey/ens-dao-governance">lowest level since the DAO's inception</a>.</p><p><strong>We need to discuss ways of engaging more relevant industry members to participate in the ENS.</strong> Bringing in external forces can create a culture shock for the DAO, but it will also bring more diversity to the discussions.</p><p>Whether it's distributing incentives and/or delegations to active DAO members or onboarding blockchain groups specialized in governance, we need to discuss best practices to foster participation in the ENS DAO.</p><p>That way, we won't need to activate our protections: the delegates themselves will have the votes and proactivity to protect the DAO's treasury.</p><h2 id="h-conclusion" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Conclusion</h2><p>The economic conditions and governance implementation of ENS made a potential attack not only feasible but highly profitable, with potential returns of 3-5 times the investment.</p><p>The lack of easily accessible, coherent data about the treasury inadvertently served as a temporary shield, but it was only a matter of time before this information reached malicious actors.</p><p>Currently, there are unknown wallets holding token amounts exceeding the average quorum, positioning them among the largest token holders. This presents a critical decision point for the DAO: whether to continue exposing itself to the risk of these dormant whales suddenly becoming active in governance or to implement a proactive action plan.</p><p>The blockful team has been integrally involved throughout this process, from the initial identification of the vulnerability to the development and proposal for the creation of the Security Council. Our comprehensive approach included:</p><ul><li><p>Data analysis and study of past attacker behaviors.</p></li><li><p>Smart contract research, implementation, and testing.</p></li><li><p>Proposal coordination, crafting, and simulation.</p></li><li><p>Legal research and benchmark of other security councils' good practices.</p></li><li><p>Collaboration with meta-governance working group stewards, delegates, and the broader community.</p></li><li><p>Managing all associated fees and costs for smart contract deployment and audits.</p></li></ul><p>The Security Council was designed with several key features to balance security and decentralization.</p><p>These measures create a governance structure that is more resilient to capture by whale token holders and state actors while providing a crucial safeguard against potential attacks.</p><p>By implementing this solution, ENS has taken a significant step towards securing its future, setting a precedent for responsible and adaptive DAO governance in the face of evolving threats.</p><hr><p><em>Follow&nbsp;</em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/blockful_io"><em>blockful on X (Twitter)</em></a>&nbsp;to support this kind of research*.*</p><p><em>Please consider delegating your governance tokens to </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://app.ens.domains/gov.blockful.eth"><em>gov.blockful.eth</em></a><em> if you believe in a sustainable way of governance that approaches security, public goods, and DAOs longevity.</em></p><p><em>See ya in the mempool and forums!</em></p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/f06be5be47b7154b0798486be457c755ef6ae60f8d60f739b19d13f28a4aabbb.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[Anatomy and antidote for Compound War]]></title>
            <link>https://paragraph.com/@blockful/anatomy-and-antidote-for-compound-war</link>
            <guid>II7k2ydWcLXwO5uabKlp</guid>
            <pubDate>Tue, 30 Jul 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[On May 6, Humpy and the Golden Boys submitted an unexpected on-chain proposal to allocate 5% of Compound’s COMP into goldCOMP.]]></description>
            <content:encoded><![CDATA[<p><em>Authors: </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/alextnetto"><em>alextnetto.eth</em></a><em>, </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/guiribabrb"><em>guiriba.eth</em></a><em>, </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/0xneves"><em>0xneves.eth</em></a><em>, </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/theZeugh"><em>zeugh.eth</em></a><em>, </em><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://x.com/danimimm"><em>danimim.eth</em></a></p><h2 id="h-timeline" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Timeline</h2><h3 id="h-may-6-unexpected-proposal" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">May 6 - Unexpected proposal</h3><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/1e876fe73d1baf11dbb34e0c6846b85b324e387f1026fbe389bb3ac88c301ec3.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAOCAIAAADBvonlAAAACXBIWXMAAAsTAAALEwEAmpwYAAADdklEQVR4nLWTTWjbVhzAncsOBR98MQQydNqHDwp4U4eZDwYdDNNWrdGQ4XV7dp/bN/JCX8fzJifKqsaKkRORultFIoo76jIdXDCZYGMwGINccvFhh3RdxnLwYbkYqoG2kosPHpWGs2yHHcZ+h/fgffD7f7yXaK6vz83NXVxYyOVyQoSqqjzPp9NpSmkqlZIkaXZ2Np1OZzIZTdMUReE4bmZmJpVKJSIyEYIg8DxfKBQEQUgmk3t7e5PJZDweJxq3N547d26enxdFUYkghGiaJooiIaRYLEIIGWOiKMqybFmWIAjFYlFRFAhhPp83TdP3fVVVBUGQJCk+TCkNgmASkXjyNPzt6e/Hx7+EYTj5H0gcPf458/zL333z7e4Xu4PBIAzDIAim4z+Z7sZMF4MgODk5CcPw+4j9/f3RaPRMMOXJr8EPjx79x3jH4/HBwcHx8fGpoPvZg0Qi8cEV8sJLLwrCq7lcLpvN5vOvv3b+/CvZLEKoWCxyHFcoFKZNyufzHMfxPC9JUjKZzGazHMdlMplpY8fj8WmJ4mk4HFJKl67RVWOt0Wx9uKw3mq2la9dN0+x0OoQQSqkVoeu6bduEEAghQghCKMuyKIoQQt/3wzAcDod/bWciFv50+OP2zt17D7+6dde79/DLB7tft7a72/d7/X6/3W5vbm42Gg2MsWVZEELHcSilmlaPlY7j2Lat63psBQD4vh/X50wGiqJUymVdX9G0j2qMvY9xpVxGCMmyvFyvG8aNUqlUrVbflN6oVi+/ewlcrlR0XccYAwBQhG3b8TMFANi2/ec/iAWHh4eMsRuGgTFGCEUBaoSQxcVFjHF9ZbW11V5rblyv1WltGVZx/eO1JVZvmOuGYVBKMcYQwuldhJDneWcyGI1GLIJSqus6AIAQwhhDCFXK5bXmRutOZ6V5m920zVvu1s79Tzuf39za+eSO4zhOXBbTNC3LIoQghDDGhJDhcHimRCQCIQQAYIy12+1YSQgxDKPGWKmkXnxbfkdZWNVXaoy9dwmoqgoAiGNnjGmaBiFUVRVjTCn9uwBEqKqqKIqqqpRSSZLihGDEWxcuxNFduXoVIcTz87qu+77fjeh0Ov1+vxPheZ5t20dHR6eCIAg8z+v1nj0bz/N83+/3+91u13Vd3/d7vZ7ruvHlbrfb6/U8z3NddzAY/OvX+wOWFCEo8vNIkwAAAABJRU5ErkJggg==" nextheight="694" nextwidth="1598" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Humpy and the Golden Boys&nbsp;<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.comp.xyz/t/treasury-to-invest-5-of-comp-holdings-into-goldcomp-vault/5221">presented a proposal to invest 5% of Compound's tokens in a strategy called goldCOMP</a>, submitting it directly on-chain and then posting it in the forum.</p><p>It works like a wrapped COMP: the tokens are deposited in a contract and return goldCOMP.</p><p>The proposal aimed to get 92K COMP from Compound to provide the initial liquidity for goldCOMP. The COMP provided by the DAO would be placed in the Golden Boys'&nbsp;<em>vault</em>&nbsp;and deposited in a 99/1 goldCOMP/WETH&nbsp;<em>pool</em>&nbsp;at Balancer. This capital would then generate 10% p.a. for all goldCOMP holders, including Compound.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/59842cd0184984591f93752e599177ba97f38f290153e22910039fee00bc09ea.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="471" nextwidth="1519" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>The idea was not well received, because the capital would be managed by a <em>multisig</em> of the Golden Boys. At the time, those responsible for arguing against the proposal were Open Zeppelin's cylon and Wintermute Governance.</p><p>According to the study from cylon, they had already found 325K delegate tokens with a similar pattern: withdrawal from Bybit and delegation to a new address. <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.comp.xyz/t/governance-security-notice-goldcomp-proposal-247/5220">Only 75K tokens short of a quorum</a>.</p><p>These 325K tokens represent 47% of the tokens voted on in proposal 289, <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://compound.finance/governance/proposals/289">which culminated in the release of capital to Humpy.</a></p><h3 id="h-jul-9-another-try" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Jul 9 - Another try</h3><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/9c14127f221287eb496f5fa4a83974cd24683c88cc846ca8af1d9c048b2dfefb.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="555" nextwidth="1537" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Humpy commented that the accusations that he was stealing or attacking governance were unfounded. For him, it's just a proposal requiring investment</p><h3 id="h-jul-15-coordination-bait" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Jul 15 - coordination bait</h3><blockquote><p>We think the goal here was getting the sense of how much votes the DAO could coordinate to defend from this proposal.</p></blockquote><p>Humpy submitted an <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.tally.xyz/gov/compound/proposal/279">onchain proposal</a> for the second time, it ended up not passing.</p><h3 id="h-jul-24-production-ready" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Jul 24 - Production-ready</h3><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/77f31eddf049d8a0883d8336fe021140eb049a53b3c959b733e3b2b37b1a73ce.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAZCAIAAADfbbvGAAAACXBIWXMAAAsTAAALEwEAmpwYAAAFH0lEQVR4nJVVa28UVRgelCDttqXAkkANqBFaeoHSgIm3Sqm0pbRK9INoohLD79AQAmzbbYnGxA+GgF9U9IsRjTHxb6gB3N25z97nPufMnNuYM9OOpBfUN08nZ848p+97nveywqFnDg8MHh8aGTs6NHq4f+jI0eHBkRMjoyeP9A8NjowNDB07OjzaPzA8MHRscOTE6NgLx0dPvframfy+vh07u3d27noUT3X07NnXd/LUS/uffvbgoef7Dj63O39A6B8ePTs3PzkzOzt3Yebc3OmJqemZ+dm5C6+Mn5k6d/7M5PTE5PSLL4+Pn548OzU7NT03NTM3/8Zbu/MHOnK9ue49Gbp35bfvyI1PTH3x5e03335n4vXZmfMXBkfGhO3dXcL+3u25XGfX7o7uPd29+7p27e3qye/YmRM22rYntm17Ml1t8lUQOnI9vfm+rp58Z8/ezp58R65XuHjx/ZWVzwqFpcXFYoqFBY7FxeJScWWpuLxUXFkoLl+5eq24fPPDS5fffe+Dm59+fuXqtcJScaG4nKGwVCwsFW8UFq/fKFy7Xvj4kyvXbyxc+uiycOvWHRrHYRTFjzVRUWEY3f3u+9t3vorCUJYVSulW5DCKFE33/ODeTz8L33x7N45jIzBrwMpQBaYXQhSh6BHEcfzDj/e+TvhhoxE2W6DRBI0mrDegaT3KTMAj/uXX34QoQhgRCEOEyGNuQCmNELcoQgiTIIwQ/hd+yA9ggVIWhmEAAICQUMo2M4wxJwBOoJRCGPp+wF8J2Yqf0DlfoJS6rtdqtW3bwRivC4QxFscxALBeb9i2TQgha/xmu53qttEAALV63bIsmjqAMHQ9z3HdrQ5EKHI9z/cD/u8pCwBwXL6Bt1CJExw3CIJVB34QWJZtmiYMw01vACFsm6bFb8BF5Ddom6ZpIbR5QJ7nt1ptx3EpZdwBgNC2HdtxEMJbXbndNl3XTXLA0oBs24m2cOD7vmlZiYPkBgAA20kd8ANZrrIDMInA932aObDtRCK8KT8IAtt2vIQvELK+XwghsqKqurGxlQilZMMmxrhckTTdwISwDXwBIUwpo4whhBHGGBMOQjnSNSYIY/41Q/qKVxdpiGmBU0rX8fkNNN0olUXuZg0JdT1S20gwTbtUFsui9LBUtiwn6TIuGGMxITwHzHHctmnG/98YY4TQMAxNXlNWu20CALLayyRChBLbcURJVRRV041qra7phlGt1usNWVElme9KMv9o1GqyooqSrGq6rKgRQozFAIa24wEAfN/PfFPGZedJTpul1TZ//+PPtmlBGEIAAYAAQj4SgsAPgiAAvh8k0wLwHZ/D8zxCkrOmVZI0y7JrjWY66QghkGJIEaNM4DlKjBCenIiPMz7QkgdCKH3y9PM/QviswzgVIS0z03Qk2eCN4vmMxQjjrNJWJeJ9YDsVUaqIkijJoiTLiqobhqyo5YqkqFpF5M9UK1XTFVVLtU6SHVuBr5hN27IbzVYAYJQEkuYokSiZiFk463LI1tK1WkPJa7bmkdK4jt37sGa1LFFRLNtOK/ufGxBC6/VGqSwqqiYraqPZ/O9VRBnjDpDzANRqRq1aq5PkZ4MSGjESUsxzQCltNJqlcuXBw9L9v0qSrFRr9TUpjLIoyYqu64ZhVDXd4ND0UrkiyYpRrXEfhLkY1JAT8ooASRYxn+qMEq4QEwghzVY7DV9NhFZUTVG1VGtZUdO1phtZsXKmptsO76kwaWXCO59XSzoKVps8KZm/AS5Y6S3oQr/RAAAAAElFTkSuQmCC" nextheight="1275" nextwidth="1657" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Humpy and the Golden Boys upped the ante by asking for 499K COMP, ~5.5x more than what was expected on the forum. In addition, they added the grantPhase function, allowing the contract set up by Humpy to invest the money as soon as it was received.</p><p>The proposal passed, having 50k more votes "against" than the bait proposal, but it wasn't enough to block it.</p><h2 id="h-humpy-background-and-history" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Humpy background and history</h2><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/5af73869c2609f2212e08113a85051523cf246811c82778cfb6e4090b1629787.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAANCAIAAABHKvtLAAAACXBIWXMAAAsTAAALEwEAmpwYAAAEdUlEQVR4nC3SwWvbdhjGcUH/gBxXQ4ON2SEMekpoD4VCfahLU0JySHwJGHJLD8GkXWkpDkscCiHMS2bNS2ZjzTi1EnmKWzdoEp6MUW0kpPyiSWiTpzkWwpqxpsrYB4WAKYw4+9zfw/vwhV6+fDk5NTk/Pz8zMxOJRKLR6OLi4sOHD0OhUDqdXlxcXFpaCofDMzMzL168CIVCs7OzoVCo+Xfz+Pj4+dfPN9Y31tfX19bWlpaWGIYJh8PLy8vz8/N37tz5agSiKCoQCPj9fgiCnj175vV6V1dXI5GI3+83DCMYDHq9Xp/P5/V6oZG5ublbt24xDNNoNCAI8vl8gUDgyxGe5/1+//j4+NjY2O3bt8fGxjweD3TePF9eXl5YWPB4PMFgcGJiYmVlBcOw169f9/v9J9NPbn5x0zsyMTFx48aNR48eeTyera2tfr/v8/nu378fDAbHx8cfP34MAJicnJybmwsEAvfu3bt79+7VB5eXl91udzAYqKr6kflo27au67ZtW93u58+ftb+0RqPRbDZlWTYMQ1VVlmUVRanVaq7rOo5jWVa329V1vd1u93o95iPTbrdbrVa9XqcoKhaLQbZtAwDi8fj09DQMw2/evBkMBsPhsFgsiqLouu5wOCQIot1uO46jqqrjOJIkybLc6XRkWf5kfxoMBo7juK57eXGJ4/hGbCORSGQyGQRBwuEwpKrq7Ozs1NRUNBpFEOTBgwe2bV9cXCQScDqdzuVyrutubm7u7+9ns9n1b9YxDIt/F0+lUplMBobh3d3dZDK5thYtl8vD4XB3Z/fp06eRSGRlZWV1dXVhYQEyDCORgFOpn05OTmKxGIIghmFUKpXSCMdxjUZD13XHcXq9nmma3W7XNM1+v++6rqZpqqoCADiOE0VRVdVUKlUoFA6PDovF96lU6tWrV5BpmqqqyrJM0zRFUb+LoiRJFEURBFEsFjmOYxjm7OxM07R6vV5nWYZhOI5TlD8oigIA8Dxfr9VLpVK5XAYAaJpG03S1Wi2XyyRJYhgG/WvbJPlrqVSKx7/d2tpCUbSAFzAMo2kahuGdnR0EQfBjnCCIfP4thmHJH5NIJiOKIpyEcfyXXDa7v7+HYVih8P/V9vY2iqL5fH57extBEGg4HF7F0LU6nc5g5HqN6zYURdFbeqvVuu6keX7eaGimaTbPm51Ox7IswzBM07Qsy3Y+9Xo927YNw+iNXFUgSRDPCwRJ/pzNJpM/EARBkCSKoiRJ5nI5FEVLpXcIglAURdO/JZNJlmXpSgXH8UTi+6Ojw5ORQgE7yB2g+XylQiMIsrm5+eHDh0QicXBwQJAEZFmWJEmn4FQQhOtNRfFMEPhTcAoAUNU/AQAsy0qSVK1WNU3TdV1VVY7jarWaIAiieKYoiiIro3D/qdVqFEWxLFutVkVRrNUYSFGUq5VxPJfLYRiWyWTS6fS79+8lSdrb28vn84VCgSAIFEWPjg7z+bfCFZ7neZZlK5WKpmkAAIqiOI7jeb5cLguCUK/XAQAEQQAA/gPfZy8c7wRypAAAAABJRU5ErkJggg==" nextheight="512" nextwidth="1280" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Humpy is a well-known figure in DeFi. He has already exploited the governance vulnerabilities of other DAOs, most notably Balancer.</p><p>At Balancer, Humpy acquired millions of dollars of veBAL, aiming to capture the organization. At first, his focus was only on BAL emissions for the project's <em>pools</em>. By acquiring power in the governance of the protocol, he was able to direct token issues to <em>pools</em> that provided liquidity.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/b8682a2a20449f392e3e0ebc9666e5ec45991f856be20b20f0f3db674ce8100c.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="1205" nextwidth="2142" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>The strategy was simple:</p><ul><li><p>Create a <em>pool</em> in Balancer;</p></li><li><p>Uploaded a proposal for voting on issuance to the <em>pool;</em></p></li><li><p>Vote with your tokens and feed <em>bribes</em> to other wallets;</p></li><li><p>Extracted the possible issuance and replayed the <em>playbook</em>.</p></li></ul><p>When the siege tightened, Humpy even wanted to ban Aura (Balancer's sub-DAO) from participating in the votes, in order to maintain his dominance over Balancer.</p><p>Andrea, one of the members of the Golden Boys, was part of this capture of Balancer. At the time, he helped Humpy in discussions on the forums, approving proposals that were beneficial to both of their <em>bags</em>.</p><p>As Humpy had captured the governance of Balancer and Aura, the solution was to make a peace agreement with him. The agreement made in 2022, agreed that Humpy would only direct emissions to <em>pools</em> where the cost of the bribe per veBAL is greater than the dollar value of the veBAL emissions. In short, “aligning himself for the long term with Balancer”.</p><p>He also divested several of his positions in veBAL, reducing his dominance over the project. Still, it is one of the largest and most influential portfolios at Balancer and Aura.</p><h2 id="h-diving-deeper-in-the-proposal" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Diving deeper in the proposal</h2><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/11b2486440e46a182ac5e386973cb7a7865d2be7aaf5eafb65bb99c23ecc2124.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAAPCAIAAAAK4lpAAAAACXBIWXMAAAsTAAALEwEAmpwYAAACMElEQVR4nJWTIZDkIBBFUdGRUaviIlvFjcThkEgkEtkSiWyLRGKxsZFjY2OxWK423E1N7d7O7j6RSiUFH/7/zdoX1Fpvt5uUEgCWZRmGAQD2fW+/hLXWzvOMMaaLeBFC8N6HELpSp5RirQUA7721ViklLxCx1vpKwHuvtZZSaq0R0RijlELE7SLGuG1bzpmIcs5a61JKSmkcx2EYaq1EdBzHKwEi4pyv67osy+12W5ZFKcU59xfrunLOjTFSSu8957wfHwCEEFpra+03NzjPc9u2lBIROeeICBHXdU0pee+3bXuk0lobxzHnfBxHN6en8rDxc5DvAp/JOQshnHPjOE7TVEpprR3HoZRi7H0JIr69vUkpH/Jf3mDf95xzd7k/P1TFew8AiOi9JyKtNRENw+Ccu9/vRGStjTH25EMIRBRC6E2JMTJjDBHdLgCAiIwxOWcpZU/bGAMA53l67/uXUkrfLsaIiEKIXjnGGABwzqdpGi8AgCFiSmmeZyGEUmrbNkSMMdI/1FXHEIK1VkophAghCCEYY845rbUQYl1XRJRSKqX6PlprY4zWmvUi5pxTSv39fr8/p9QuxwEgxmitzTlP06SU6n/PJ0op9RP/D7nvm3Oe57n3fZ5nznlrbd93zvkwDNM0IeLrhP/W9Fnwg8x5nrVWc/EQ7r611nq7vhf4Fnf1db3oM09EP1n4I4Faq9bae88uAMA593p6fyfQWuvzNY4jY2xZlnmeu2M/EfgDc/QLo2g/coQAAAAASUVORK5CYII=" nextheight="1074" nextwidth="2232" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>The important insights here are</p><ul><li><p>The Golden Boys multisig can change the delegatee of the tokens deposited in goldCOMP.</p></li><li><p>COMP tokens will only be returned from the Trust setup to the DAO if the multisig allows.</p></li></ul><h2 id="h-possible-solutions" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Possible solutions</h2><p>Some argue is an attack, others not. The fact is that the Golden Boys now have 6% and will have 11% after executing the proposal (1.1M COMP) of token supply in delegation, and the last time where quorum hit 1M was proposal 139 (Dec 2022 to approve Open Zeppelin&nbsp;<strong>security</strong>&nbsp;partnership), so the DAO is captured.</p><p>We cannot count on the other top token holders, they are exchanges, VCs and other entities that are not engaging in delegation. The reasons are diverse: compliance, security in tokens custody or just voter apathy.</p><p>The last chance is bulding around the <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.tally.xyz/gov/compound/proposal/290">proposal</a> that Arr00 submitted 1 hour after the Golden Boys proposal passed, the snapshot for this voting will be taken before the 500k COMP can be delegated.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/26f0f31423910e1362b22e3a9a8cdf8717ad54354d4436bb28031379e09bb6b7.png" alt="" blurdataurl="data:image/png;base64,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" nextheight="602" nextwidth="1304" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p>Note how close the first proposal's execution is to the voting start of the second proposal. If the voting start were after the execution of Humpy's proposal, the snapshot would include the 5% of COMP received by him.</p><p>The governor starts voting and takes a snapshot 13140 blocks after the proposal is submitted. A timelock delays execution by 172800 seconds (~14400 blocks) after the proposal is queued.</p><p>If the community considers it an attack and wants to get rid of the control and capture, the only way is to accept this proposal, transfer the timelock admin to the Compound's community, and then decide the future.</p><h3 id="h-scenario-1-new-governor-blocking-goldcomp-delegatee" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Scenario 1: New governor blocking goldCOMP delegatee</h3><p>Deploying a new governor that will not consider the vote of the address that the goldCOMP contract is delegating to neutralize the social power involved in the proposal. It will maintain the tokens that Humpy bought, and it's an easier solution, also giving time for delegates to engage and take some security measures.</p><h3 id="h-scenario-2-fork-token" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Scenario 2: Fork token</h3><p>Creating a new COMP token, which is airdropped to all previous wallets, excluding the ones that voted "for" in the Golden Boys proposal and the tokens obtained with the proposal.</p><p>That's may be hard proposal to pass because it will make the COMP token useless by decoupling it from governing the treasury and protocol. But it can be interesting if there are any incentives to vote ”for”, as we saw in&nbsp;<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://insights.glassnode.com/aave-token-analysis-migration-staking/">other token migrations</a>.</p><h3 id="h-scenario-3-accept-the-capture" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Scenario 3: Accept the capture</h3><p>As Humpy and the Golden Boys are heavily invested in COMP, is also in their interest to not lose money and make the protocol survive. There is no turning back if this happens and the proposal for transferring the timelock admin doesn't pass.</p><h2 id="h-preventing-it" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Preventing it</h2><h3 id="h-security-provider-that-takes-action" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Security provider that takes action</h3><p>Open Zeppelin (getting $4m/year), which is in charge of&nbsp;<strong>security,</strong>&nbsp;and Gaunlet, which makes most of the proposal and does risk analysis, didn't take any action or proposal toward increasing DAO security.</p><p>OZ got early insights about related wallets on the first on-chain proposal and made the possible risk clear in the forum. But security is not just monitoring and warning. Is taking action and proactively stewarding the governance towards a more secure place.</p><h3 id="h-security-council-for-vetoing" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">Security Council for vetoing</h3><p>Back in March, blockful conducted a governance audit that exposed a concerning situation for ENS DAO, ending up in the immediate delegation of 4M ENS to a contract that can only vote "Against" and now the creation of the&nbsp;<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://www.tally.xyz/gov/ens/proposal/42329103797433777309488042029679811802172320979541414683300183273376839219133">Security Council</a>, live since 2 days ago.</p><p>Recently, an&nbsp;<a target="_blank" rel="noreferrer" class="dont-break-out" href="https://etherscan.io/tokentxns?a=0x245445940B317E509002eb682E03f4429184059d&amp;p=13">address</a>&nbsp;was noticed accumulating 1.5m ENS, buying it almost every day for the last 382 days, but it&nbsp;no longer represents a risk for the capture of the organization.</p><p><strong>In an adversarial and permissionless environment, security must be preventive and crucial.</strong>&nbsp;It takes motivation, passion, and attention to detail.</p><h2 id="h-similar-movements-are-not-new-in-history" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Similar movements are not new in history.</h2><p>The 1988 RJR Nabisco Takeover: A Case of Legal Manipulation and Strategic Voting: in 1988, the leveraged buyout of RJR Nabisco by Kohlberg Kravis Roberts &amp; Co. (KKR) showcased how legal manipulation and strategic voting allowed KKR to gain control, despite fragmented and apathetic large shareholders. This event highlighted vulnerabilities in corporate governance and led to significant financial market reforms.</p><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/3c4b6b13c37aebc7057419fe38b9fdc7719b80fc9f5a8ddce2c0272cb0d90551.png" alt="" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAATCAIAAAB+9pigAAAACXBIWXMAAAsTAAALEwEAmpwYAAAD0klEQVR4nJ2UIYyrShSGETVrVqzbrNiEpKpJRZMKVBMEScUmK5ogEE0QmyAqRpBUVNRVIBBNMJMgECMQCMQIRAWiYgQCMQKBQIxAYEjGjOBlO/t4u/f25r28T1RAOf/Mf/5zlOEenPPZbLZYLBRFmc/n0+nUMAxVVReLBQDAsqztdqsoimEYlmWtVqvpdNq27TAMQohfSil3BYQQQRBACD3PO5/PEMIoioIgCMMwTdM4jrMsO5/PURTFcRyGIUKo7/u7pT4FxE+G/4u4V+TODTjnjLH6J03T/P7LOf/XY30KUEqTJEEIRVGEMfY8T1GUx8dHRVFeX1/n8/lkMnl6etJ1/eXlRVEUVVVfXl4eHh6k7yN5nsdxjBCK43h07FMgy7L9fg8A+Pj4cBwnjuOu6/obnPO2bfM8P51O8/ncMIz1eh3HcVmW8vijOZxzCOHhcHBvVFX1JdC2bXGDECKEaNs2TdMkSWQDIYR5nmOMAQDb7Xa329m2DQCo63rMDOe8qirGWBRF4Y00Tdu2raqKc64ghFRV1TRNVVXP8yzL2u/3mqbpug4AQAgJIbquK8uyruskSYqiqKpKOiAFmqZJ0/R4PCrf2O/3GGPGmMI577pOnp1S2jTNMAyEEErpWCJN0yzLMMaXyyXP8yzL8jwf33ZdZ5pmcAMh5Ps+ACAMwyzLPi0SQhBCgiCwbbtpGoSQZVnH4xEAYJrm6XSq6zqKIgCApmmGYby9vZ3PZ9d1GWPSZTkuwzBUN7quI4SM8gql1Lbt5+dny7Ku1+tyuZQXPJ1OclY558MwMMaapsEYU0qFEGVZYoz7vq/rWtd1aWBd10VRSAP+SRHGeLvduq5r23YYhtIoxhjnvCiKruukywAA13UdxzFNMwzDvu993y/LkhCiaZosKj/5VUCmbaw1Ts33IRJCVFVFCLler3mey/hfLpdhGKT1fd9XVSXdHoZhrPbVA/nvPy2TP8EY67pus9nIXHVdxzmXAowxmZGvQQMATCaTzWZDCJFRGcnzPEkS27Yxxtk34jj2PG+z2by/v1NKy7KUcZIWtW0rnwghlLIsDcOYTqez2cx13TAM5a3h3wRB4Ps+/InjOACA5XI5m80ghDJRY8pHpa8byGDVdc0Y+4/bVNx2g2wPpVQ6Tikdt5PcJZ8CjLEsyyCEctwppRBCjHFZlrJvvy9z2XBKaZ7ndV0fDge5GHzfT5KkaRrGGEKoKIqmaRTTNDVNWywW6/Xa933P83RdN244jnP3+ISQNE0RQuv12nGc1WoFIdztdpZlmaZ5OBx2u53jOJfLhRDyF02/XN7Q3uWjAAAAAElFTkSuQmCC" nextheight="438" nextwidth="729" class="image-node embed"><figcaption htmlattributes="[object Object]" class="hide-figcaption"></figcaption></figure><p><strong>Open question</strong></p><ul><li><p>Most of COMP came from exchanges, so they know who is behind it, or... they are behind it. Are Humpy and the Golden Boys somehow backed by exchange? If not, why would these individuals expose their identity to exchanges like that?</p></li></ul><br>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/4800c8b86e02226d340d1fe5cbe06f53a952d74d932a62c5047724324d882d24.jpg" length="0" type="image/jpg"/>
        </item>
        <item>
            <title><![CDATA[It's time to break the reputation silos.]]></title>
            <link>https://paragraph.com/@blockful/its-time-to-break-the-reputation-silos</link>
            <guid>yZV8bmvH9NC0O06LqNSS</guid>
            <pubDate>Thu, 20 Jun 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[Trustful breaks reputation silos by letting communities import or create badges and use them anywhere. An open-source reputation aggregator built on Valocracy concepts]]></description>
            <content:encoded><![CDATA[<p><em>An open-source software that enables users to import reputation badges from other systems or create new ones, allowing those to be used in multiple communities with little to no need for structural adaptation.</em></p><p><em>Trustful is currently participating in Octanct’s Epoch 4 of Public Goods Funding; you can show your </em><strong><em>support by voting for us </em></strong><a target="_blank" rel="noreferrer" class="dont-break-out" href="https://snapshot.org/#/octantapp.eth/proposal/0x91b8b02e7eba7dff9e05b4d5018d74ee2efdf7789942ce862401d0df45659348"><strong><em>here</em></strong></a><strong><em>!</em></strong></p><h2 id="h-why-build-on-reputation" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Why build on reputation?</h2><p>For nearly one year, <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://blockful.io/">Blockful contributors</a> have been researching different approaches to reputation, diving into historical developments from word of mouth, through writing and the printing press, and all the way to social media algorithms. We've studied <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://researchseminars.org/talk/Metagov/200/">traditional peoples and their social structures</a>, many web3 solutions with their different pros and cons, and <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://github.com/orgs/global-reputation-protocol/repositories">we've hacked and won with our initial concept</a> of how to contribute to this space.</p><p>Most of the studied solutions either turn communities into popularity contests that disproportionally reward Public Relations over other skills and contributions or completely disregard the contextual nature of how humans attribute trust to each other. Those characteristics differ abruptly from long-evolving human practices, making the user experience uncomfortable and actively disengaging people. This makes it unsafe to use the results from those systems to decentralize power or create trusted environments.</p><p>Plutocracy is broadly present in DAOs and is arguably a core element of even their earliest conceptual structures. Over the last couple of cycles, it has caused engagement issues, created governance risks, and <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://vitalik.eth.limo/general/2018/03/28/plutocracy.html">attracted criticism from allied</a> and opposing opinions.</p><p>In January, our team <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://checker.gitcoin.co/public/project/show/zutrust-by-blockful">applied with ZuTrust</a> to the Zuzalu tech round on Gitcoin, taking our first step towards making a public good product that would bring what we learned into a valuable solution for digital communities.&nbsp;With this initial funding, we dedicated efforts towards gathering insights from builders in different communities. We found converging opinions on how this dynamic, where your bag size is the only relevant metric to amplify your voice, limits and frustrates members, trimming their participation and creating mistrust in the voting or funding round results.</p><h2 id="h-the-full-picture" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">The full picture</h2><p>Gathering those diverse research points allowed us to define some core concepts that Trustful will carry throughout its uses:</p><ul><li><p><strong>Reputation is contextual.</strong> It is only possible to functionally assign a reputational value to an action if you specify the context in which it will be recognized.</p></li><li><p><strong>Reputation and trust go hand in hand.</strong> While the first is one-to-many, the second is one-to-one.</p></li><li><p><strong>Trust allows for reputational bridges.</strong> While I might not be able to confirm someone's long-term contributions to a community, I can recognize their reputation there if I trust that community's reputational consensus.</p></li><li><p><strong>Trust works very similarly regarding reputation and expertise.</strong> I might not be able to verify someone's knowledge of Particle Physics. Still, I can recognize their expertise if I trust a reputable educational institution like MIT or a group of experts to assert that expertise.</p></li></ul><h3 id="h-from-those-concepts-trustful-has-derived-its-core-features" class="text-2xl font-header !mt-6 !mb-4 first:!mt-0 first:!mb-0">From those concepts, Trustful has derived its core features:</h3><ul><li><p>Issuance of <strong>Statement Badges</strong> in the form of <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://docs.attest.org/docs/welcome">EAS Attestations</a>, which serve as statements of something about someone.</p></li><li><p>Creation of <strong>Reputational Scorers</strong> in the form of lists of "badge:relevance" pairs.</p></li><li><p>Issuance of <strong>Reputation Badges</strong>, also in the form of EAS Attestations, that are the result of checking an address against a Scorer.</p></li></ul><figure float="none" data-type="figure" class="img-center" style="max-width: null;"><img src="https://storage.googleapis.com/papyrus_images/2c561543ff5268d038f7914e70514e0dd9296fc8a907a727bafa8646aa36f470.png" alt="Trustful dApp Homescreen" blurdataurl="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAACAAAAASCAIAAAC1qksFAAAACXBIWXMAABYlAAAWJQFJUiTwAAACkUlEQVR4nKVU604TQRQeO9nptsPOzkzvYiil26WldOlFcbfLrQUCXrBEf5GUIJcaTVqQaGJisFXR8Bb+8gF8CB/CxIfRbBfbgrLbyOZkMpvN+b79zvnOARiTTH4sp00VCiVKGSHyNYNx9u1H4+ev9pfv2yKSAMYkrsSSyngymbw+OiEypbT5qfL5a233jYl9MqCUiYhgLGEsUco4D9o67FMm/6MJAASAAIBg3QmRQ6GwKPoR8iLkBQBAKDjUilLW/WqdV0UgGOCcMW6BWHBb9fpJu9N49nzvoNFsHc4vVCAUelLIRfldaBqJhjEmjoU6zwUYS7mctrhULd6+oxvljUebicQEhAIAHgCAKPovpUkj8mTuVmnevWE2B0DIO79Qefuu02wdVlZWt3d2Ox9PT9qdp3v7ewcNdTItInFQCqUsrkSV9CjjfCgCjKVUSl1bW998/MScm9ON8sONmpYv6IaR02ai0RjGUi9H7pYYIYyQJIr+S/r+TQChUKkuH7963Xp5fHp29qLZWr93v/3+Q/PoaGd3X8sXhIs95zyom6ZulB9s1MrmnLMdLAJpREpMKIZhLq+sLi5V88VSJpNdqq7oprlVr8/O3r1kKkpZKBQOBMORaCwSjjh46ZyAUoax9KerHoS8ougHwAOhACHEllfkwYGw+yyNXHDtVejnBPZ82UFpoPfKuHUnA9C2/ZX0aFyJYZ9Lh/sKXEO27N9PS6g3p4pj3ZkYwkXDEJCBP6KUeW54cfex6+lC8Lcu10il1KSSSkwo6mTaYUX2CbLZad0opzNTw6AzHshpM1q+kC+WdKOczU67E8Tj46qqKkrK3j/OwXkQY9KtkDVrfp/f3aaEyL11fXWfrRi0XG+tOq/u322+m1yDw/ZJAAAAAElFTkSuQmCC" nextheight="1396" nextwidth="2522" class="image-node embed"><figcaption htmlattributes="[object Object]" class="">Trustful dApp Homescreen</figcaption></figure><p><strong>Statement Badges</strong> are the core of the user experience. Trustful's interface makes it easy for anyone to issue Statement Badges to another address by simply choosing from a list of types or creating their own. It also allows users to connect and import their reputation from various sources, enabling a broader usage of different systems that are already culturally integrated into their communities or offering specific functionalities to meet their needs. For imported badges, the issuance, the verification of values, and the adaptation to a standard data format are done by Trustful's back-end server, allowing off-chain data to be considered for on-chain scenarios.</p><p><strong>Reputational Scorers</strong> turn Statement Badges into usable scores. Users can create new scorers by defining what badges are relevant to them and specifying their relevance value, which serves as a multiplier. Flexibility on the valuation of a Statement Badge allows for the same contribution to be considered appropriately in different communities or contexts, such as voting proposals of a specific nature, allocating funds from a community treasury, or acknowledging reputable builders of another DAO inside your organization. Users can also select scorers from a list, identifying their creator and choosing to trust their parameters for what defines reputation in their context. We are excited to work with innovative governance systems like JokeRace to allow DAO members to curate their scorer values.</p><p><strong>Reputation Badges</strong> are generated by scorers and allow their resulting values to be used for on-chain interactions. They are EAS Attestations containing a numerical score value and a Scorer ID. They will be the core piece for using Trustful in your community structure, being easy to use in a governor contract extension for voting, with Passport for funding round matching scores, or with a Hats eligibility module for roles and permissions.</p><h2 id="h-launching-our-first-versions" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Launching our first versions</h2><p>Trustful is now under development, with an MVP built on Optimism and one on the Stellar Network. Those two early versions explore different aspects of improving the recognition of effort and expertise inside communities.</p><p><strong>ZuGeorgia MVP on Optimism</strong></p><p>The first OP version will focus on creating new Statement Badges and <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://zuvillage-georgia.framer.website/">will be tested on ZuGeorgia in late July</a>. It will allow organizers and attendants of a Zuzalu pop-up village event to give badges to each other in recognition of their contributions and knowledge. This mobile-first version aims to enable the community to create its first badges, which members will later use to generate Reputation Scores.</p><p><strong>Stellar Quests MVP</strong></p><p>The Stellar version will focus on importing badges from the current Stellar Quests system and creating Reputational Scorers and Reputation Badges for different contexts inside Stellar's governance ecosystem. It will qualify developers' expertise in certain areas, amplifying their voices on matters in which they have proof of knowledge.</p><h2 id="h-funding-a-public-good" class="text-3xl font-header !mt-8 !mb-4 first:!mt-0 first:!mb-0">Funding a public good</h2><p>Trustful is an open-source software that aims to provide communities with a way to value member contributions and have resources for making more informed decisions.</p><p>Our initial funding came from the Zuzalu Gitcoin round earlier this year. We have also received <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://communityfund.stellar.org/">a grant from SCF</a> to fund the development of the Stellar MVP and are currently participating in the selection process for Octant's Epoch 4.</p><p>If you want to support Trustful to be open and accessible for everyone, please share this post or support us by <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://snapshot.org/#/octantapp.eth/proposal/0x91b8b02e7eba7dff9e05b4d5018d74ee2efdf7789942ce862401d0df45659348">voting on the Snapshot proposal for Octant</a>.</p><p>If you are interested in knowing more, <a target="_blank" rel="noreferrer" class="dont-break-out" href="https://blockful.io/">feel free to reach out</a> or follow us here or in social media to get more updates soon!</p>]]></content:encoded>
            <author>blockful@newsletter.paragraph.com (research.blockful.eth)</author>
            <author>blockful@newsletter.paragraph.com (danimim.eth)</author>
            <enclosure url="https://storage.googleapis.com/papyrus_images/97c0c71c4ada8b8c8714badc1bd6f54f851187cf236f3512fcd0e69255af943f.jpg" length="0" type="image/jpg"/>
        </item>
    </channel>
</rss>