Assessment reports>Symbiotic>Threat Model>requestSlash

Function: requestSlash(address network, address operator, uint256 amount, uint48 captureTimestamp, byte[] hints)

This function requests a slash using a network and a resolver for a particular operator by a given amount using hints.

Inputs

  • network

    • Control: Completely controlled by the caller.

    • Constraints: N/A.

    • Impact: Address of the network.

  • operator

    • Control: Completely controlled by the caller.

    • Constraints: N/A.

    • Impact: Address of the operator.

  • amount

    • Control: Completely controlled by the caller.

    • Constraints: Cannot be zero.

    • Impact: Maximum amount of the collateral to be slashed.

  • captureTimestamp

    • Control: Completely controlled by the caller.

    • Constraints: Must be within the veto window.

    • Impact: Time point when the stake was captured.

  • hints

    • Control: Completely controlled by the caller.

    • Constraints: N/A.

    • Impact: Hints for checkpoints' indexes.

Branches and code coverage (including function calls)

Intended branches

  • Slash request is queued.

Negative behavior

  • Reverts if slash amount is zero.

  • Reverts if captureTimestamp is not within the veto period.

  • Reverts if not called by network middleware.

  • Reverts if network not opted in vault.

  • Reverts if operator not opted in vault.

  • Reverts if operator not opted in network.

Zellic © 2025Back to top ↑