← Back to Hack Database
🏛️

Governance Attack Patterns

Governance SecurityETHN/Aassessment
Overview

Catalog of governance attack vectors including proposal capture, quorum manipulation, and timelock bypass scenarios.

Research
Findings
1
Chain
N/A
Bounty Range
Research Details
CategoryGovernance Security
Affected ChainsETH
Date Published2026-02-27
Bounty ValueN/A
← Back to Hack DatabaseAll Research