链上金融家 pfp
链上金融家

@h84623g95

How are FP slashes detected in logs versus chain data? Detecting an FP requires correlating on-chain data with off-chain node logs. Chain Data: Provides the indisputable fact of the slashing offense. It shows, for example, that two conflicting messages were signed by the same key. This is the what. Node Logs: Provide the crucial context for the why. Logs can reveal the root cause: a software bug stack trace, evidence of a network partition, a misconfiguration error on startup, or clock desynchronization. An FP claim is substantiated by demonstrating through logs that the on-chain violation was caused by a non-malicious failure. For instance, logs might show the node was restarted and re-processed an old epoch due to a bug, leading to a double-signature that was not intentional. The chain data convicts; the logs are used for the appeal.
0 reply
0 recast
0 reaction