Gno GovDAO Critical Security Exploit
Critical vulnerability discovered in Gnoâs governance system allowing complete takeover.
Exploit Details
Severity Assessment
- CVSS Score: 10.0 (Critical)
- Attack Vector: Spoofed governance proposal
- Impact: Full control over governance, validator set, and funds
Attack Steps
- Create exploit realm - Attacker deploys malicious realm
- Submit spoofed proposal - Disguised as legitimate governance action
- Social engineering - Trick govdao voters into approval
- Execute proposal - Add malicious realm to
AllowedDAOslist - Update implementation - Use
UpdateImplfor full control
Attack Surface
- Exposed
AllowedDAOslist allows arbitrary updates - Lack of visibility into executor code in proposals
- No permissioned executor pattern
Recommended Patches
Immediate Fixes
- Remove arbitrary
AllowedDAOsupdate capability - Add mandatory visibility/auditing for proposal executor code
- Implement âapproved actionsâ whitelist pattern
Architectural Improvements
- Permissioned executor with predefined action types
- Multi-signature requirements for critical operations
- Time-delayed execution for governance changes
Business Impact
This exploit was discovered during Gno fork analysis and influenced the decision to:
- Start fresh with new codebase rather than forking existing Gno
- Prioritize security-first governance design
- Avoid complex multi-tier governance structures