website logo
ConnextBlogBridgeAcademy
⌘K
🚀CONNEXT WIKI
What is Connext?
Connext Bridge
NEXT Token
Supported Chains
Connextscan
FAQs
💢CONNEXT ECOSYSTEM
Connext Team
Backers
🤖ECOSYSTEM ROLES
Community Leaders
Amarok Pilot Dev
Ecosystem
Router Operator
Subgraph Provider
Testers
Connextooor
Bridgooor
Developer
Contributors
Quarantine
Status
🏅ROUTERS
What is a Router?
Router Requirements
Revenue Streams of Routers
Slashing Mechanism
Staking Mechanism
✨TECHNICAL DOCUMENTATION
Introduction
Connext Network
nxtp
🧁PROTOCOL UPDATES
Amarok
💥CONNEXT DAO
💫RESOURCES
Important Links
Brand Kit
Events
Telegram Groups
Newsletter
Docs powered by archbee 
4min

Slashing Mechanism

To discourage router misbehavior, slashing mechanisms will be utilized in the network. The Connext network will utilize integrated mechanisms that are designed to incentivize network participants (i.e. routers) to act in the best interests of the network.  

What is Slashing? 

Proof-of-stake blockchain protocols usually apply slashing mechanisms to discourage validator misbehavior. As such, slashing is designed to incentivize honest node participation as well as to ensure node availability and a high level of security. 

Connext transactions are executed across chains via a locking mechanism. Assets are transferred one to one, meaning there is no possible way for the Connext protocol or routers to steal a user’s funds, even if they all coordinated to attack.

Slashing, however, is implemented within the network to ensure that routers maintain highly performant service.

The purposes of slashing

The staking and slashing mechanism is used specifically to penalize a grieving vector where routers try to keep funds locked up for a long period of time. Routers cannot steal funds by doing this but it would worsen the user experience dramatically as routers could force users into a lock up.

With the implementation of the Amarok network upgrade, this grieving vector will be removed 

To prevent router misbehavior, Connext will utilize slashing. The protocol is capable of detecting malicious behaviors onchain and will punish routers that engage in these.



🔗Staking Mechanism

Additional security mechanisms

Updated 23 Apr 2022
Did this page help you?
Yes
No
UP NEXT
Staking Mechanism
Docs powered by archbee 
TABLE OF CONTENTS
What is Slashing? 
The purposes of slashing
🔗Staking Mechanism