paint-brush
Hackable DAOs Follow Hackable Protocols, and the Internet Has Noticed by@web3scout
330 reads
330 reads

Hackable DAOs Follow Hackable Protocols, and the Internet Has Noticed

by web3scout
web3scout HackerNoon profile picture

web3scout

@web3scout

web3/cybersec consulting

April 8th, 2022
Read on Terminal Reader
Read this story in a terminal
Print this story
Read this story w/o Javascript
Read this story w/o Javascript

Too Long; Didn't Read

Performance review, which the company or managers may strongly depend on at the time of personnel work, so do the software engineer when contributing to the team, plays a big role in the operation of the organization. The degree to which software engineers work together, or more precisely, affect each other, including assistance and drag, far exceeds that of most other. Software engineers are severely subject to the output of others, especially in the companies that continue to develop their own products. The issue is worth an in-depth discussion for us in the industry.

People Mentioned

Mention Thumbnail

web3scout

@web3scout

Mention Thumbnail

Rekt Capital

@rektcapital

featured image - Hackable DAOs Follow Hackable Protocols, and the Internet Has Noticed
1x
Read by Dr. One voice-avatar

Listen to this story

web3scout HackerNoon profile picture
web3scout

web3scout

@web3scout

web3/cybersec consulting

About @web3scout
LEARN MORE ABOUT @WEB3SCOUT'S
EXPERTISE AND PLACE ON THE INTERNET.


Too much buzz around DAOs at a very abstract level. Unfortunately, in practice there are a lot of misunderstanding, pitfalls and risks.

Who controls any DAO?

The very first DAO is the Bitcoin network and protocol. The simple answer to question - “Who controls any DAO?” is a protocol. The problem is that protocols are developed by somebody. Protocols need to be updated. The 1st risk is centralization on protocol/code developers, a human factor. Protocols should be created and improved by decentralized community.


The 2d risk follows the 1st one. It’s an imperfect technology and implementation, lets look into Rekt Capital’s hacks leaderboard:

image

Decentralization has its own fundamental bugs, any decentralized system or protocol is hackable by 51% attack, DAOs are hackable same way. Anyone who controls more than half of governance power (tokens) can propose and execute any transaction, including the withdrawal of all DAO treasury.


Following code is from most popular openzeppelin smart contracts library.

image

Most simple DAOs can be considered as multi-sig wallet with extended function to call other smart contracts and send/receive crypto. It’s simple but powerful, such DAO can participate in any protocols available, interact with oracles, can be extended by other smart contracts. But hacks leaderboard shows new records.


Unhackable and efficient governance itself is a challenge.

image

Looks like a sci-fi utopia, but who knows?

image

Centralization and middlemen are a big stop factors for humanity progress, new forms of digital distributed organizations are needed, let’s hack in order to turn hackable DAOs and governance into unhackable unhackable DAOs.


To be continued…


L O A D I N G
. . . comments & more!

About Author

web3scout HackerNoon profile picture
web3scout@web3scout
web3/cybersec consulting

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Coffee-web
Learnrepo

Mentioned in this story

profiles
X REMOVE AD