Open dnkolegov opened 1 year ago
The following attack may be possible:
A malicious validator A submits a checkpoint Ch_A, the subnet actor counts its votes.
A
Ch_A
Validator A leaves the subnet, receives all the staked tokens back, and transfers them to another malicious validator B.
B
B adds the stake, and then B may vote for the same checkpoint Ch_A. As a result, A's weight is used twice.
The following attack may be possible:
A malicious validator
A
submits a checkpointCh_A
, the subnet actor counts its votes.Validator
A
leaves the subnet, receives all the staked tokens back, and transfers them to another malicious validatorB
.B
adds the stake, and thenB
may vote for the same checkpointCh_A
. As a result,A
's weight is used twice.