What Are the Two Primary Forms of Malicious Behavior That Typically Trigger a Slashing Event?
The two primary forms of slashable malicious behavior are 'double-signing' and 'inactivity leakage' (or equivalent severe offenses). Double-signing occurs when a validator signs two different blocks for the same slot or height, attempting to fork the chain.
Inactivity leakage is a less severe form of penalty for extended downtime, but true slashing is reserved for provably malicious acts that compromise the network's integrity.