SKIP TO CONTENT
Blockchain

Double Signing

A validator offense of signing two conflicting blocks or messages at the same blockchain height.

What is Double Signing?

Double signing occurs when a validator signs two different blocks or attestations at the same blockchain height. This is one of the most serious offenses in Proof of Stake networks because it enables potential double-spend attacks and threatens consensus integrity.

Why Double Signing is Dangerous

In distributed consensus, validators must agree on a single canonical chain. When a validator signs conflicting blocks at the same height, they're essentially voting for two different versions of truth. If enough validators did this, the network could split into incompatible forks.

How Double Signing Happens

Accidental: Running duplicate validator instances (e.g., during migration) can cause both to sign blocks. Poor key management or backup failures are common causes of accidental double signing. Intentional: Malicious actors might attempt double signing to enable double-spend attacks or disrupt the network. The economic penalties make this extremely expensive. Client Bugs: Software bugs in validator clients have historically caused double signing events, affecting multiple validators simultaneously.

Detection and Proof

Blockchain networks maintain systems to detect double signing. Evidence of the offense (the two conflicting signatures) is submitted on-chain. The cryptographic proof is irrefutable. If you signed both messages, there's no dispute possible.

Slashing Penalties

Double signing triggers the harshest slashing penalties:

  • Ethereum: Minimum 1 ETH, scaling up with correlated offenses
  • Cosmos: Typically 5% slash plus permanent jailing
  • Polkadot: Variable based on concurrent offenders

Prevention Measures

Remote Signers: Specialized signing infrastructure that tracks what's been signed and refuses duplicates. Slashing Protection Databases: Local records of past signatures to prevent accidental duplicates. Single Instance Enforcement: Never run multiple instances of the same validator simultaneously. Proper Migration Procedures: When moving validators, ensure the old instance is fully stopped before starting the new one.

Client Diversity

Running diverse validator clients across the network prevents correlated double signing from software bugs. A bug in one client won't affect validators running different software.

Examples

  • Running two Ethereum validators with same keys causes double signing
  • Cosmos validators are jailed permanently for double signing

From definition to application. Explore real opportunities.

Track live yields, compare protocols, and build your DeFi portfolio with Fensory.

GET EARLY ACCESSArrow right