Hi, I believe the authors adequately described the different attack vectors when P-DAOs are introduced. The mitigating measures like requiring that only the root can send P-DAO and validation of VIO seem reasonable. Klaas