Open shawn-zil opened 3 months ago
The consensus was that this task was too wide in scope, the risks of breaking the network is unclear, and the reward may not be worth the effort.
Instead, we will write public documentation with recommendations on how to run Validators in a way that reduces their attack surface i.e. best practices for running Validators; and only to implement specific automated measures to mitigate specific attacks when the risk becomes real, in the future.
In the event of a Sybil attack, Validator nodes can get spammed with garbage blocks. Develop Sentry nodes that envelop and protect the Validator nodes to mitigate the issue.