TLDR – A CALL TO ACTION IN THE NEXT 48 HOURS
We have irrefutable evidence supporting a malicious governance attack with respect to the recent vote on “Proposal for Tech Infusion, Support, and Expansion of Truefi Products.”
This post is a call to action to gain social consensus that this scenario justifies the use of the canceller multisig. For the unacquainted, the power of cancellation has already been granted to the multisig via TFIP-6, but since this is the first time the DAO has experienced such a scenario, it makes sense to request feedback before canceling the proposal.
As we will show in the evidence below, it is clear that an entity, individual, or coordinated parties purchased TRU Tokens on Binance with a hedge in order to gain super-majority voting share to ram through this proposal. There is significant economic gain to be had for the Teragon team (and whoever else helped them potentially) given the ~1.5-million-dollar payout (at today’s prices) and minimal cost of trade execution.
Abnormal TRU Token Voting Amounts
As of close of the voting period, over 41 million TRU tokens voted in favor of the aforementioned proposal. This is abnormal by DAO standards, with the average 5 proposals receiving 15.4 million TRU voting in favor. The last time this many tokens voted in the affirmative was on October 17th 2023 with 83.28 million voting in favor. However, TRU tokens were priced at just $.033 at the time. Consequently, if you adjust for today’s prices, the October 17th 2023 proposal would only equate to ~22.5 million TRU, half of what was used for the malicious proposal.
Coordinated Wallet Creations
Another key piece of evidence is the large wallet’s that voted in favor of the proposal. They are listed below for reference:
- Address 0x94CE9Fd7c4b7C6F544347683B630393ed6C45d83 | Etherscan
- Address 0xFecf0c08ebdB2228aBcbdD37ea6151b234853841 | Etherscan
- Address 0x6Df0a7011560693878831ca9F6BA8857A54d6b6e | Etherscan
- Address 0xF099fCadf4d8D33a5Cf1869f67c9b22034773Ed0 | Etherscan
- Address 0xbBACb3a43a4C9E360cd878fa78670f96fADd927d | Etherscan
- Address 0x3A67D40d7385Ba08Aa1c170Bad4bb0133267D083 | Etherscan
Upon review, all wallets were created within a few hours of each other on July 4th (EST). Additionally, all wallets came from the same exchange, Binance. The odds that this quantum of tokens and wallets were made in quick succession and time interval makes it apparent that one individual party controls all of these wallets. Thankfully, the manipulator was too lazy, impatient, or worried about market exposure from negative funding rates, to space the creation of these wallets out to at least give a semblance of normalcy.
Negative Funding Rate Anomalies on Binance
We also looked at historical funding rates for the TRU token over the past few weeks and saw an abnormal pattern emerging in the same time period that the previously aforementioned wallets were created. As you can see in the chart below from data taken from (https://app.laevitas.ch/assets/perpswaps/TRU), Binance is the only exchange to have had significantly negative funding rates in the past week. Given all of the tokens above originated from Binance (as proven above), it is quite obvious that the manipulator shorted the TRU token on Binance in order to create a D1 trade after purchasing the TRU tokens with the intent to manipulate voting without taking price exposure to the TRU token. It is quite obvious at a ~-33% funding rate in the past week that the hedger entered the positions on or around July 4th, the same day that the wallets were created.
Elevated TRU Futures Volume During Past Week
There has also been a significant spike in TRU Perps volume over the past week, which also correlates with the period that the manipulator began to hedge their position. Data provided from the same source, Laevitas, shows a massive spike on July 11th, the vast majority of which was on Binance.
Call To Action
As one can see from the verifiable evidence provided above, we believe that the right course of action would be to block this proposal from executing to prevent bad actors from stealing money from the DAO treasury.
Given the creation of the Canceller Multisig that was introduced following the Tornado Cash DAO takeover (https://www.coindesk.com/tech/2023/05/21/attacker-takes-over-tornado-cash-dao-with-vote-fraud-token-slumps-40/), we can do this if we act within the first 48 hours of the vote passing.
At a high level, the Canceller Multisig was put in place to prevent faulty or adversarial proposals. The multisig has the ability to execute a transaction that would render the proposal ineffective. You can check out the TFIP that implemented this feature here: [TFIP-6] Assign CANCELLER role for TrueFi Governance - **modified**.
While the cancellation of this proposal does not mean that Teragon can’t make another proposal again in the future, it is the responsibility of the community to wait for other proposals to come in before we rush into one that has had uniformly negative opinions against it on public forums and votes in favor of this proposal are clearly the result of a governance manipulation.
We now ask the community to voice their opinions on the matter, so we can achieve social consensus to execute the Canceller contract. The Multisig has never been used and this would set a precedence for its use in the DAO.
Looking Forward
At Cicada Partners, we hope that we can spearhead a proposal in the near future to eliminate the possibility of this happening again by requiring a time-lock feature on voting, that is long enough to disincentivize bad actors from purchasing tokens immediately before a proposal to manipulate results. Feel free to message the Cicada Team, if you would like to speak further on the matter or if you have additional information or thoughts to share in regards to the voting attack.
Thanks and Best,
Cicada Partners