Skip to main content

What Are the Two Primary Forms of Malicious Behavior That Typically Trigger a Slashing Event?

The two primary forms of slashable malicious behavior are 'double-signing' and 'inactivity leakage' (or equivalent severe offenses). Double-signing occurs when a validator signs two different blocks for the same slot or height, attempting to fork the chain.

Inactivity leakage is a less severe form of penalty for extended downtime, but true slashing is reserved for provably malicious acts that compromise the network's integrity.

What Specific Actions Typically Trigger a Slashing Event?
What Specific Actions Can Trigger a Slashing Event?
Give an Example of a Malicious Action That Triggers Slashing
What Are the Specific Conditions That Trigger a Slashing Event?