Skip to content

Bribery Through Vote Delegation

id: LS08M
title: Bribery Through Vote Delegation 
baseSeverity: M
category: governance
language: solidity
blockchain: [ethereum]
impact: Protocol decisions can be skewed by economic incentives unrelated to long-term interests
status: draft
complexity: high
attack_vector: external
mitigation_difficulty: hard
versions: [">=0.6.0", "<latest"]
cwe: CWE-732
swc: SWC-133

๐Ÿ“ Description

  • Bribery through vote delegation occurs when token holders are incentivized to delegate their governance votes in exchange for bribes, payments, or yield, enabling:
  • Governance capture by a single whale or bribing contract Misaligned decision-making, where votes representshort-term gain rather than community values,Protocol behavior that favors the briber (e.g., fee allocation, token emissions, treasury grants).
  • This is particularly dangerous in protocols using vote delegation (e.g., Compound Governor Bravo, ERC20Votes, or veToken models) without enforcing voting power restrictions or quorum diversity.

๐Ÿšจ Vulnerable Code

// โŒ No restrictions or disclosure for delegated vote usage
function delegate(address delegatee) public {
    _delegate(msg.sender, delegatee); // Can be bribed off-chain
}

๐Ÿงช Exploit Scenario

Step-by-step bribery:

  1. A governance proposal is introduced to change the reward distribution in a DEX.
  2. A whale or bribing platform (e.g., vote market) offers users yield in return for delegating votes.
  3. Thousands of users delegate to the bribing contract, increasing its vote weight.
  4. The bribing contract uses the delegated votes to pass a self-beneficial proposal โ€” e.g., boosting emissions to its LP.
  5. Protocol funds and rewards are now misallocated, hurting non-participants and damaging governance integrity.

Assumptions:

  • Bribe markets like Votemarket or Hidden Hand allow coordinated vote selling.
  • Protocol fails to detect or limit vote concentration via off-chain delegation incentives.

โœ… Fixed Code

// โœ… Limit max delegation per address (soft control)
modifier enforceDecentralization(address delegatee) {
    require(delegateWeight[delegatee] < MAX_DELEGATION_CAP, "Delegate exceeds cap");
    _;
}

// โœ… Track source of delegation for transparency
mapping(address => address) public delegatedFrom;

function delegate(address delegatee) public {
    delegatedFrom[msg.sender] = delegatee;
    _delegate(msg.sender, delegatee);
}

๐Ÿงญ Contextual Severity

- context: "Default"
  severity: M
  reasoning: "Requires coordination but has meaningful influence on protocol control."
- context: "Governance system controlling treasury or protocol logic"
  severity: H
  reasoning: "Attackers can pass malicious proposals via vote-buying."
- context: "Pure signaling governance"
  severity: L
  reasoning: "Less impactful due to non-binding votes."

๐Ÿ›ก๏ธ Prevention

Primary Defenses

  • Monitor for rapid vote delegation spikes before proposals.
  • Encourage vesting-based governance (e.g., veToken models with lock-in).
  • Implement reputation penalties or rate limits for high-flux delegators.

Additional Safeguards

  • Track on-chain vote delegation flows and audit proposal influence concentration.
  • snapshot-based voting models to reduce real-time delegation manipulation.
  • Apply multi-sig or council overrides in early-stage governance for safety.

Detection Methods

  • Slither: Detect rapid delegation state changes (delegate-churn, governance-bribery-pattern).
  • Analyze governance participation metrics for voter clustering or reuse.
  • Monitor on-chain bribe payout contracts and linked wallets.

๐Ÿ•ฐ๏ธ Historical Exploits

  • Name: Arbitrum DAO Governance Incident
  • Date: April 2025
  • Loss: Undisclosed influence over governance decisions
  • Post-mortem: Link to post-mortem

๐Ÿ“š Further Reading


โœ… Vulnerability Report

id: LS08M
title: Bribery Through Vote Delegation 
severity: M
score:
impact: 4         
exploitability: 3 
reachability: 5   
complexity: 3     
detectability: 4  
finalScore: 3.85

๐Ÿ“„ Justifications & Analysis

  • Impact: High โ€” governance distortion can redirect protocol funds, emissions, or upgrades.
  • Exploitability: Moderate โ€” requires incentive system and coordination but no smart contract flaw.
  • Reachability: Very high โ€” all vote-delegation systems are theoretically vulnerable.
  • Complexity: Moderate โ€” bribery platforms and vote tracking make this easy to scale.
  • Detectability: High โ€” patterns emerge in on-chain voting data and bribe payouts.