-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A Node Operator can circumvent DAO validator key approval #141
Comments
I think we can leave it for the after-release. Node operators can technically make system behave erroneously, but they's a very convoluted process that can't be done by mistake, and NO set is permissioned, professional and has no immediate way to profit from that. |
Yep, I agree that, currently, we have more important issues to fix. |
Closed at #478 |
Decided to re-open the issue because some more sophisticated approaches still exist. For instance, suppose that steps 2, 3, and 4 are reordered as 3, 4, 2 by leveraging Easy Track motions front-running. It can be tolerable with the curated set of node operators. Would require additional Easy Track factory for the upcoming validators sets, and also can be addressed using the https://eips.ethereum.org/EIPS/eip-2537 (expected in the Cancun hardfork) |
Adding validator keys is performed as follows:
However, a node operator can currently add keys that were not approved by the DAO using a simple trick:
N
correct keys.stakingLimit = N
M <= N
more (bad) keys and removes the firstM
keys.stakingLimit
is stillN
, and the newly-added keys are allowed to be used in staking despite not being approved by the DAO.Moreover, currently, key removal is implemented by copying the last key to the storage slot previously occupied by the removed key, so simply decreasing the staking limit won't help. We need to either shift all keys to the left or mark individual keys as validated instead of using an index pointer.
Failing test scenario: #142
The text was updated successfully, but these errors were encountered: