-
Notifications
You must be signed in to change notification settings - Fork 6
Open
Description
EIP-3076 states:
- Refuse to sign any attestation with target epoch less than or equal to the minimum target epoch present in that signer’s attestations (as seen in
data.signed_attestations
), except if it is a repeat signing as determined by thesigning_root
.
In test single_validator_resign_attestation.json, for block proposals for pubkey 0xa99a...
, we have in the interchange file:
Source: 5 -------------> Target: 15 (Signing root: ...203)
The minimal anti-slashing DB retains only the unique attestation.
Later, in steps[0].attestations[2], we want to import:
{
"pubkey": "0xa99a76ed7796f7be22d5b7e85deeb7c5677e88e511e0b337618f8c4eb61349b4bf2d153f649f7b53359fe8b94a38e44c",
"source_epoch": "5",
"target_epoch": "15",
"signing_root": "0x0000000000000000000000000000000000000000000000000000000000000203",
"should_succeed": false,
"should_succeed_complete": true
},
We try to import a attestation, corresponding to the minimal proposed slot for this pubkey (which is actually the maximum one as well if consider a minimal anti-slashing DB), with the same source, epoch and signing root.
==> This import should be both valid for minimal anti-slashing DB (should_succeed
) as well as for complete anti-slashing DB (should_succeed_complete
)
Metadata
Metadata
Assignees
Labels
No labels