On March 23, 2024, the tokenised-RWA protocol CurioDAO was exploited for approximately $16 million — minted as 1 billion CGT (Curio Governance Token) tokens to the attacker. The vulnerability was in a MakerDAO-fork smart contract responsible for voting-power management; the attacker bought a small CGT position, used a bug to amplify their voting power dramatically, and used the inflated voting power to vote in arbitrary contract actions including the malicious mint.
What happened
CurioDAO's governance was built on a MakerDAO-derived smart contract for managing voting power and proposal execution. The fork had inherited a vulnerability in how delegated voting power was calculated: under specific call sequences, a small CGT holder could exploit the calculation to claim voting power far greater than their actual CGT balance.
The attack:
- The attacker acquired a nominal quantity of CGT through normal market purchases.
- Exploited the voting-power calculation to register themselves as holding amplified voting power — effectively a majority position in CurioDAO governance.
- With majority voting power, executed arbitrary actions on the Curio DAO contract — including a proposal to mint 1 billion CGT tokens directly to the attacker's address.
- The mint executed; the attacker held 1B CGT worth nominally ~$16M at pre-attack market prices.
- Dumped the CGT through DEX liquidity, extracting real value before the market priced in the dilution.
Aftermath
- CurioDAO paused affected contracts and announced a recovery strategy.
- The team launched CGT 2.0 — a new token issued to legitimate pre-attack CGT holders, effectively voiding the attacker's minted supply.
- A white-hat bounty program was announced offering 10% of recovered funds to anyone helping trace the attacker.
- Stolen funds were laundered through standard channels.
Why it matters
Curio is one of several incidents that highlight the inheritance problem of forking battle-tested governance systems. MakerDAO's governance contracts have been deployed and tested at the largest scale of any DAO; their behaviour at MakerDAO is well-understood. Forks that modify the surrounding token-distribution and voting-weight logic without re-auditing inherit any composite vulnerability the modifications introduce.
The pattern repeats:
- Audius (Jul 2022) — re-invokable initializer let attacker self-delegate 10 trillion AUDIO.
- Beanstalk (Apr 2022) — flash-loan-acquired governance majority.
- Curio (Mar 2024) — bug in voting-power calculation amplified small balance to majority.
The defensive answers — time-weighted voting power, token-lockup before voting eligibility, timelocks between proposal pass and execution, emergency multi-sig veto — exist in the modern DAO governance toolkit and are increasingly standard. Forks that ship without them remain exploit candidates.
The CGT 2.0 reissuance as a recovery mechanism is also notable: this approach works only for small-cap tokens with controllable token distribution. It is essentially the "we are voting to undo this on-chain" approach to immutability, and it works when the protocol's holders + counterparties agree to recognise the new token.
Sources & on-chain evidence
- [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-curio-hack-march-2024
- [02]cryptonews.comhttps://cryptonews.com/news/curio-hit-by-16-million-exploit-due-to-voting-power-vulnerability/
- [03]cryptotimes.iohttps://www.cryptotimes.io/2024/03/26/curio-strikes-back-with-cgt-2-0-following-16-million-exploit/