Attack Scenarios and Mitigations

Price manipulation attacks

Governance weight uses USD value derived from decentralized sources such as BandChain and stablecoin DEX pricing.

Flash loan governance attacks

Impossible because share tokens cannot be transferred or borrowed.

Whale takeovers

Require an economically irrational amount of capital and expose the attacker to large penalties.

Resolution withholding

Proposer slots are first come, first served. If no proposer submits a resolution, someone else will.

Spam markets or spam proposals

Rate limits and eligibility prevent this.

Sybil farming

No benefit, as power is not based on address count.

Incorrect evidence

Challenges and votes resolve this, and incorrect actors lose stake.

Every major attack vector is neutralized by economic alignment or protocol rules.

Last updated