Everstake Home
Products Solutions Security Resources Developers Company
staking slashing risk

Institutional

web3 infrastructure

Slashing Risk: Prevention, Insurance Compared

Interest in institutional staking is rising fast. MiCA regulation in Europe, ongoing ETF staking approval discussions, Blackrock staking ETF intends to stake 70-95% of their ether holdings and overall institutional enthusiasm towards PoS assets have pushed staking slashing risk from a technical footnote to a boardroom question. TL;DR What Staking Slashing Risk Is and Why...

APR 09, 2026

Last updated APR 29, 2026 · V1

Interest in institutional staking is rising fast. MiCA regulation in Europe, ongoing ETF staking approval discussions, Blackrock  staking ETF intends to stake 70-95% of their ether holdings and overall institutional enthusiasm towards PoS assets have pushed staking slashing risk from a technical footnote to a boardroom question. 

TL;DR 

  • Slashing is a protocol-enforced penalty that permanently destroys a portion of staked tokens when a validator misbehaves. 
  • Rules differ across Ethereum, Solana, Cosmos, and Polygon. 
  • Staking slashing risk root causes: double-signing, prolonged downtime, and missed attestations. 
  • Prevention: anti-slashing middleware, geo-distributed infrastructure, and strict key management.
  • Insurance products (e.g., Chainproof, Nexus Mutual) exist but cover narrow scenarios. 
  • Everstake has recorded zero material slashing events since 2018, with 99.98% uptime across major networks.

What Staking Slashing Risk Is and Why It Matters for Institutions

Slashing is the automatic, irreversible confiscation of staked tokens by the protocol itself. It reduces staked balance.

For retail stakers, a slashing event is a financial setback. For institutions managing client assets, it might become a compliance event with reporting obligations, potential liability, and reputational consequences. 

According to Rated, the total percentage of blocks with stake slashed on Ethereum is 0.0034%. However rare, staking slashing risk events are dangerous for the security and reputation of the network, its participants and validators.  

Slashable offenses fall into two categories. 

  • Safety violations involve double-signing: a validator signs two conflicting blocks or attestations for the same slot. 
  • Liveness violations involve prolonged downtime or missed duties. Not all networks slash for both. Understanding which applies where is the starting point for any institutional risk assessment.

Network-by-Network Slashing Rules: Ethereum, Solana, Cosmos, and Polygon

Rules vary significantly. A framework that works on one network may expose an institution to unexpected penalties on another.

Table 1: Slashing Rules by Network

NetworkSlashable OffensesPenalty RangeTombstoning?Governance-Mutable?
EthereumDouble-signing, surround voting1/4096 of effective balance min + correlation penaltyNo (exit only)No
Cosmos (ATOM)Double-signing, >95% downtime5% (double-sign), 0.01% (downtime)Yes (double-sign)Yes
SolanaNo slashing currentlyN/ANoYes
Polygon (POL)Double-signing (Heimdall layer)Partial stake burnYesPlanned updates
AptosDouble-signingStake lockup + penaltiesNoYes

One distinction matters more than most: tombstoning versus jailing. Jailing is temporary, while the tombstoned validator is permanently removed from the active set with no recovery path. 

On Cosmos, double-signing results in tombstoning. Jailing and tombstoning as explicit, named mechanisms are essentially a Cosmos SDK construct.

Slashing parameters on Cosmos chains have been modified via governance votes. Institutions with multi-year staking horizons should factor in that the rules underwritten today may not apply in two years.

Slashing on Solana: Current State and What’s Coming

Solana remains the notable exception among major proof-of-stake networks: there is currently no in-protocol implementation of slashing.

Historically, enforcement has been manually implemented through hard forks following community agreement. 

That is changing: Anza has put forward a three-SIMD roadmap to bring programmatic slashing to mainnet. SIMD-0204 introduces an on-chain mechanism allowing anyone to submit evidence of slashable behavior, creating a verifiable, immutable record of validator misbehavior. For institutions operating on Solana today, slashing is not yet a live protocol risk, but the infrastructure to enforce it is being built, and preparation should precede activation.

What Actually Causes Slashing in Practice

Most slashing events are not caused by malice. They are caused by operational mistakes.

Double-signing is the highest-risk cause. It happens when two validator instances sign conflicting messages for the same slot. The most common trigger is failover misconfiguration: an operator switches to a backup node while the primary is still running. 

A disproportionate share of historical slashing events have occurred during key migrations between clients or data centers. 

Institutions onboarding a new provider should ask specifically about migration procedures and cooldown policies.

Prolonged downtime is network-dependent. On Solana, downtime means stake moves to better-performing validators. No tokens are burned. On Cosmos, missing more than 95% of blocks in the ~12,000-block window triggers a slash. On Ethereum, extended downtime causes an inactivity leak: slow balance erosion, not an outright slash, unless more than one-third of validators are offline simultaneously.

Missed attestations are not slashable on Ethereum but do reduce rewards. Institutions sometimes conflate missed attestations with slashing. They are not the same thing.

MEV configuration is an underappreciated risk. Certain relay configurations used with MEV-boost can create conditions that result in equivocation. Institutions should ask their validator which relays they use and whether any introduce double-signing exposure.

Table 2: Slashing Causes, Risk Levels, and Affected Networks

Root CauseRisk LevelAffected NetworksTypical Trigger
Double-signing / equivocationHIGHETH, ATOM, POLDual-node failover, key reuse
Key migration errorHIGHETH, ATOM, all clientsClient switch, data center move
Prolonged downtimeMEDIUMATOM, ETH (inactivity leak)Hardware failure, cloud outage
Aggressive MEV configurationMEDIUM-HIGHETHUnsafe relay, block withholding
Missed attestationsLOW (reward loss only)ETHClock drift, network latency
Software bug / key compromiseHIGHAll networksUnpatched client, insider threat

How Institutional Validators Are Built to Prevent Slashing

Prevention is not a single tool. It is a set of independent controls, each designed to catch what the layer above it misses.

Anti-slashing middleware

On Ethereum, tools like Web3Signer, Dirk and Vouch operate as remote signers, as the first line of defense. They maintain a local database of every previously signed message and refuse to sign anything that would constitute equivocation. The database must remain persistent across restarts.

On Cosmos-based chains, Horcrux implements threshold signing: the validator key is split across multiple nodes, so no single machine can produce a double-signature alone.

Client diversity

It reduces correlated risk. A consensus client running on more than 60% of Ethereum validators creates systemic exposure. A bug in that client could trigger simultaneous slashing events across a large portion of the network, amplifying penalties for everyone running it. Institutional validators should be able to describe their client distribution and explain how they manage supermajority risk.

Geo-distributed bare-metal infrastructure 

It eliminates single points of failure. Active-passive failover is generally considered safer than active-active when both nodes share the same signing key. Multi-region deployments allow traffic to redirect without triggering double-signing. Bare-metal hardware outperforms cloud VMs for latency stability and reduces noisy-neighbor effects that can disrupt attestation timing.

Key management must be explicit and documented. HSMs protect validator keys at rest. Hot signing keys must be separated from cold withdrawal keys. Key migration between clients or data centers requires a documented runbook with mandatory cooldown periods before a key is activated on a new host.

Monitoring and incident response closes the loop. A 24/7 NOC tracking block proposals, attestation effectiveness, peer count, and disk I/O is the operational baseline. When a potential double-signing event is detected, the response window is narrow. Within 30 minutes: the alert fires, the signing process is halted, the signing database is preserved, and the incident is escalated. That sequence needs to be documented before it is needed.

Everstake maintains zero material slashing since 2018 on major networks with 99.98% observed uptime, bare metal infrastructure offering dedicated node infrastructure and securing network for institutional and retail clients. 

The Ethereum Correlation Penalty: The Risk Most Institutions Miss

The correlation penalty is Ethereum’s mechanism for punishing shared failure more severely than individual mistakes.

When multiple validators are slashed within the same 18-day window, each validator’s penalty is multiplied based on how many others were slashed simultaneously. In a catastrophic correlated event, penalties can theoretically reach 100% of stake. This has never happened, but the mechanism is real and the tail risk is not negligible.

The direct implication: concentrating large amounts of stake with a single operator, or across operators sharing infrastructure, cloud regions, or client software, increases tail risk significantly. Diversification across independent operators with different infrastructure stacks is not just prudent. On Ethereum at scale, it is structurally important.

Slashing Insurance: What’s Available in 2026

Two main products exist for institutions evaluating third-party slashing coverage.

Chainproof operates on a parametric model. Coverage triggers automatically when an on-chain slashing event is verified. No claims process. Faster payout, but coverage limits may be lower.

Nexus Mutual operates on a discretionary model. Claims are assessed by a community governance process. More flexible in scope but slower to settle.

Neither covers everything. Standard exclusions include: loss of staking rewards, reputational damage, protocol-level slashing caused by a zero-day client bug, and key compromise caused by the insured party.

Some operators also maintain internal slashing reserve funds: portions of operating revenue set aside if a slashing event occurs. The limitation is size. Reserves designed for isolated incidents may be insufficient in a correlated slashing scenario.

Governance risk is a further consideration. Slashing parameters are not immutable. Cosmos chains have changed them by vote. Insurance policies and internal risk models underwritten against current rules may not remain valid if the protocol changes.

While insurance provides an important backstop, prevention remains paramount. At Everstake, we undergo regular external security audits, a practice that strengthens operational integrity across both our retail and institutional operations.

Why Everstake’s Infrastructure Is Built for Institutional Staking

Everstake is one of the largest non-custodial staking infrastructure providers and has operated since 2018, onboarding over 130 blockchain networks. 

Zero material slashing events have occurred on Ethereum, Solana, Cosmos, Polygon, or other major networks since inception.

Geo-distributed bare-metal infrastructure spans multiple independent data centers across 10 regions. Remote signing with slashing protection databases runs on Ethereum via Web3Signer. Threshold signing via Horcrux runs on Cosmos-based chains. Validator keys are HSM-protected. The NOC operates 24/7 with incident response SLA.

Everstake holds SOC 2 Type II, ISO 27001, and NIST CSF 2.0 certifications, with a NIST score of 4.16 placing it in the top 4% of assessed organizations globally. Smart contract security audits have been completed by ChainSecurity, Ackee Blockchain, and Blaize.Security. For more information please refer to Everstake Trust Center.

Institutional partnerships include Ledger, Anchorage Digital, and Canary Capital. Everstake powers staking for the SUIS Sui ETF listed on Nasdaq. The infrastructure is built to handle institutional volumes.

Table 3: Everstake Performance Snapshot

MetricValue
Operational since2018
Historical networks supported130+
Material slashing events (major networks)0
Average uptime99.98%
Infrastructure modelGeo-distributed bare-metal
Signing securityRemote signer + HSM
Monitoring24/7 NOC
CertificationsSOC 2 Type II, ISO 27001, NIST CSF 2.0
Slashing insuranceAvailable (contact for details)

FAQ – What Institutions Should Ask Any Validator Before Delegating Stake

Can an institution lose all staked tokens? 

On Ethereum, yes, theoretically, in a catastrophic correlated event. In practice this has not occurred yet. On most networks, penalties are capped below 100%.

Does downtime always mean slashing? 

No. Ethereum uses an inactivity leak. Solana moves stake rather than burning it. Only Cosmos slashes for sustained downtime above a defined threshold.

How do you prevent double-signing specifically? 

Any serious operator should name their remote signer, describe their practices that help avoid slashing, and explain their failover logic.

What is your key migration procedure?

This is where slashing events historically happen. Ask for the runbook.

Can I verify your slashing history on-chain? 

Yes. If they cannot point you to an on-chain address or a public explorer, that may be a red flag.

What does your incident response look like in the first 30 minutes? 

The answer should be specific: who is alerted, what is shut down, how the signing database is preserved.

What is your client diversity policy? 

On Ethereum, any operator running exclusively on a supermajority client generally shouldn’t claim to have managed correlated risk.

Is there staking insurance available?

Check if staking insurance is offered by Chainproof, Nexus Mutual or the staking provider. Note that they are useful as a complementary safeguard, not a replacement for sound validator selection and infrastructure discipline.

The information provided is not intended for recipients residing in the United Kingdom.

Share with your network

Sign Up for
Our Newsletter

By submitting this form, you are acknowledging that you have read and agree to our Privacy Notice, which details how we collect and use your information.