Executive Summary: On May 10, 2026, Yearn Finance, a leading decentralized autonomous organization (DAO) in DeFi, suffered a governance attack through a sophisticated vote-buying scheme. Exploiting vulnerabilities in its delegation and voting mechanisms, attackers manipulated on-chain governance proposals to redirect $84 million worth of YFI tokens and siphon protocol revenue. This incident underscores systemic risks in DAO governance architectures, particularly in reward token concentration, delegation opacity, and insufficient cryptographic controls over vote delegation. The attack highlights the urgent need for formal verification of governance smart contracts, real-time anomaly detection in delegation patterns, and regulatory alignment for DAO voting token markets.
Yearn Finance, launched in 2020, operates as a DAO governed by YFI token holders through on-chain proposals. By 2026, YFI had a circulating supply of ~6.2M tokens, with approximately 35% staked in governance vaults. The DAO uses a modified Compound Governor system with delegation enabled to improve scalability—delegates can vote on behalf of token holders without transferring custody. This mechanism was designed to reduce transaction costs but introduced new attack surfaces.
The protocol’s revenue-sharing model—distributing 10% of yield to stakers—created perverse incentives: large token holders could profit from redirecting funds via governance proposals if they controlled a quorum.
The attackers used a combination of flash loans and OTC swaps to accumulate 2.1M YFI—~34% of the circulating supply—without triggering slippage safeguards. They sourced liquidity from three major DEXs and a private liquidity pool, executing atomic swaps across Ethereum and Arbitrum to obfuscate intent.
The attackers exploited a design flaw in Yearn’s delegation contract: DelegateRegistry. The contract allowed delegates to be set via signed messages (EIP-712) without requiring on-chain confirmation of token ownership at the time of delegation. This enabled "ghost delegation"—delegating tokens that were not yet in the attacker’s wallet, relying on future delivery.
Using a novel cryptographic technique akin to delegation proofs of possession, attackers forged delegation records by reusing nonce spaces and signature malleability, creating a chain of delegations that appeared valid but were not cryptographically bound to actual token holdings.
At block 20,200,000, the attackers submitted YIP-78, a proposal to redirect protocol revenue to a newly created treasury controlled by a multisig linked to their addresses. Due to the forged delegation records, the proposal achieved a 68% quorum—far exceeding the 33% minimum—despite only 12% of YFI being actively voted.
The attack exploited the DAO’s delegation weight decay mechanism, which reduced voting power over time unless renewed. Attackers used automated bots to refresh delegations every 12 minutes, maintaining quorum legitimacy.
Once the proposal passed, the DAO’s treasury contracts were updated to route 100% of yield to a set of proxy wallets. Over 18 hours, $84M in YFI and 3.2M DAI were drained. The attackers used Tornado Cash v3 and privacy pools to launder funds, splitting them across 128 addresses.
Oracle-42 Intelligence’s forensic analysis identified three critical vulnerabilities:
Additionally, the attack revealed a failure in Yearn’s decentralized security council, which was supposed to trigger a 72-hour delay for high-impact proposals but was bypassed due to a misconfigured timelock.
The Yearn attack is the largest governance exploit in DAO history and signals a new era of decentralized vote-buying—where attackers use financial engineering to manipulate collective decision-making. It exposes systemic weaknesses across 40+ DAOs with similar delegation models, including Aave, Compound, and MakerDAO.
Critically, it demonstrates how governance tokens are becoming financial instruments rather than governance tools, creating liquidity-driven manipulation markets. This blurs the line between protocol governance and speculative trading, raising regulatory concerns under the HoweyCoins Act (proposed 2025) and MiCA 2.0.
To prevent similar attacks, Oracle-42 Intelligence recommends the following remediation and prevention strategies:
The 20