-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious consumer can slash same validator for downtime multiple times #635
Comments
Potential solution (from discussion with @smarshall-spitzbart):
As there is no Unjail hook in the SDK, we could either add one, or just check for newly bonded validators in the set of validator updates received from staking. |
Isn't it a duplicate of #417? |
It may be. Could you please converge them into a single issue? |
Indeed it was a duplicate issue, thanks @sainoe |
Closing as a malicious consumer chain could always jail an opted in validator without that validator actually being down. |
Problem
A malicious consumer could send multiple
SlashPackets
for the same validator for the same downtime infraction, which would result in that validator being slashed multiple times.Closing criteria
Add logic on the provider that drops
SlashPackets
for downtime infraction for the same validator that were received from the same consumer without the validator having the chance to Unjail itself.TODOs
The text was updated successfully, but these errors were encountered: