If you like HyveDA, give us a follow on X
Protocol
Security
Slashing Rules
Overview

Slashing Overview

HyveDA is a completely permissionless data availability layer, which means that anyone can join the network and start providing data availability attestations. Instead of relying on a consensus mechanism, HyveDA utilizes cryptographic proofs and precise slashing rules to ensure all nodes are disincentivized from behaving in an adversarial way.

This documentation will go into the slashing rules that HyveDA will employ. The documentation of the exact implementation on-chain in Symbiotic and off-chain in HyveDA software will be released soon as well.

Slashing rules

The slashing rules in HyveDA are designed to create strong economic incentives that encourage honest behavior among nodes. By leveraging principles of game theory, the slashing mechanism ensures that acting honestly is the most rational strategy for nodes, deterring adversarial behavior. These rules are applied across two key phases of the data availability process:

  1. DA Attestation: in the attestation phase, nodes follow rules to make attestations for a chunk of data. We are currently in the advanced stages of researching and finalizing the slashing mechanism for data attestation. Our goal is to ensure that the solution we implement is both secure and effective in maintaining the integrity of the network. Updates on this development will be provided soon.
  2. Data retrieval: in the data retrieval phase, nodes should return the data that they attested for earlier.