At the beginning of this month; Zoltu claimed that it would cost a hacker up to $20 million to attack MakerDAO.
A penetration that could have the hacker possibly walk away with more than $340 million worth of Ethereum; locked within the ecosystem. Zoltan stated:
“Maker DAO v2 was supposed to launch with safeguards against a hostile MKR holder stealing all collateral and potentially robbing a good chunk of Uniswap, Compound, and other systems integrated with Maker in the process. Instead, they decided not to.”
The software developer demonstrated that MakerDAO is focusing on mitigating the risk of nefarious exploits; through enforcement of the GSM delay once a new contract is scheduled. This safety period, therefore, allows the network to counter check the contract and make sure it is not malicious.
Nonetheless, during the delay duration, a malicious hacker with sufficient funds could also turn out and vote up their contracts. A contract (s) which could have programmable instructions to steal all collateral. Micah stated that it required more than $80,000 Maker (MKR) equivalent to approximately $42 million to alter any of the Maker Contracts.
However, Zoltu added that the value of the Governance Secure Module delay is presently at 0 seconds. Which means that cyber security experts have zero possibilities of successfully defending the system from a possible attack. Despite the high level of risk, Zoltu noted in the blog post that Maker was unwilling to give up instantaneous governance control for the sake of protection. However, the Maker Foundation Interim Risk Team polled the governance issue to Maker’s community.