MTT Network
  • Welcome to MTT Network
  • Introduction
    • A. Overview
    • B. Architecture
      • 1). Tendermint Core
      • 2). Cosmos SDK Modules
      • 3). Cross-chain Interoperability
      • 4). Introduction of Ethermint Module
    • C. Validator Nodes
      • 1). Roles and Responsibilities of Validators
      • 2). Validator Election
      • 3). Validator Incentive Mechanism
      • 4). Punishment Mechanism (Slashing)
      • 5). Validator Governance Participation
      • 6). Requirements for Becoming a Validator
      • 7). Rewards Plan
    • D. Cross-Chain Communication and Asset Interoperability
      • 1). IBC (Inter-Blockchain Communication Protocol)
      • 2). Cross-Chain Asset Transfer Process
      • 3). Cross-Chain Asset Management and Applications
      • 4). Security and Challenges
    • E. Security Solutions for Partially Centralized Deployments
      • 1). Security Solutions and Strategies
      • 2). Strengthening Security for Centralized Servers
      • 3). Introducing Multi-Party Trust and Audit Mechanisms
  • MTT Token Allocation Map
    • Token Release Schedule
    • Token Unlock Schedule
  • Developer Program
  • Decentralized Autonomous Organization
    • A. DAO Organizational Operations
    • B. DAO Governance Credentials
  • Glossary
  • References
Powered by GitBook
On this page
  1. Introduction
  2. C. Validator Nodes

4). Punishment Mechanism (Slashing)

To prevent malicious behavior or inefficient operation by validator nodes, MTT Network has introduced a punishment mechanism, known as "slashing." When a validator node encounters the following situations, their staked MTT tokens may be partially or fully slashed:

  • Double Signing: A validator node signs two different blocks simultaneously, which is a serious malicious behavior and will result in severe slashing penalties.

  • Downtime or Instability: If a validator node is offline for an extended period or unable to maintain stable operation, network security and consensus processes may be affected, resulting in slashing of the validator's staked tokens.

  • Other Malicious Behaviors: Including but not limited to deliberately submitting incorrect information during consensus, manipulating voting results, etc., which will trigger the slashing mechanism.

The slashing mechanism is not only a punishment for validators but also protection for the entire network, ensuring that validator nodes fulfill their duties and maintain network security and stability.

Previous3). Validator Incentive MechanismNext5). Validator Governance Participation

Last updated 6 months ago