-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(contracts): unbond validator KRO #351
feat(contracts): unbond validator KRO #351
Conversation
When a malicious challenge successfully proved fault due to a ZK bug, the asserter will be slashed and not have bond anymore. But after challenge dismissed by security council, the output submitter is reverted to the asserter and the asserter's asset will be tried to be unbonded when output being finalized. In that case, the asserter does not have bond since it has been slashed, so output finalization will be reverted. I made a change to replace the output submitter to security council when dismissing challenge, and block proving fault when submitter is security council because security council has already validated the output.
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Base branches to auto review (2)
Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (invoked as PR comments)
Additionally, you can add CodeRabbit Configuration File (
|
|
||
// Rollback output root. | ||
L2_ORACLE.replaceL2Output(_outputIndex, _outputRoot, _asserter); | ||
L2_ORACLE.replaceL2Output(_outputIndex, _outputRoot, SECURITY_COUNCIL); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As I understand, this solution to replace the submitter to security council in the case of ZK bug gives
- challenge reward to asserter
- output reward to security council
- no bond back to the asserter
Is this right? Then I think it's somewhat unfair to give the output reward to security council, since it was actually the fund that should go to the asserter if there was no ZK related bug. How about making an extra function like recoverAsserterBond()
that recovers asserter's bond back inside the below if statement?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, what you listed is almost correct, but challenge reward will also be transferred to security council.
In this way, we need to refund the asserter's slashed bond + challenge reward + output reward to the asserter manually. In V1, we also need to refund the tax to the asserter manually in dismissing challenge case.
I also considered adding recoverAsserterBond
, but the tax amount is already tranferred to security council during slashing, so we cannot recover the asserter's bond fully. But in output finalization, the full bond amount should be unbonded, so there are also some difficulties in that way.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes, what you listed is almost correct, but challenge reward will also be transferred to security council.
Oh yeah that's right.
How about transferring tax back to the AssetManager
from security council in the case of dismissChallenge
? Is there any context at the time we decide not to return the tax back to ValidatorPool
at V1?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was no context at that time, since we did not actually undergo such cases.
Hmm then how about transferring the tax at the time of output finalization? Just add BOND_AMOUNT
to _pendingChallengeReward
and handle it after all the challenges are concluded.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@0xHansLee wdyt about this issue?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That seems better imo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I applied it, please take a look.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's reasonable to me.
BTW, when the challenge is dismissed, should the asserter be refunded? Once the challenge is proven, the asserter get slashed. I think asserter should be refunded the bond that already slashed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Oh I missed the part. I'll add recoverAsserterBond
function.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please add SlashReverted
event
b5b2ec9
into
feat/implement-validator-system-v2
Description
Unbond validator KRO during output finalization and slashing.
Additionally, there is a point to consider related to challenge process. I wanna discuss about the way to handle it, which I implemented in 83f1908.
When a malicious challenger successfully proved fault due to a ZK bug, the asserter will be slashed and not have bond anymore. But after challenge dismissed by security council, the output submitter is reverted to the asserter and the asserter's asset will be tried to be unbonded when output being finalized. In that case, the asserter does not have bond since it has been slashed, so output finalization will be reverted.
I made a change to replace the output submitter to security council when dismissing challenge, and block proving fault when submitter is security council because the output has already been validated by security council.
Please share your thoughts about the solution is appropriate or not.