Skip to content

Update further reading section on PoS rewards/penalties page #14385

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Feb 25, 2025

Conversation

emmanuel-awosika
Copy link
Contributor

Description

  • Add an explainer on EIP-7251--a proposal to increase maximum effective balance for validators (with implications for validator rewards and penalties)
  • Added an analysis of changes to slashing/penalty mechanisms under EIP-7251

- Add an explainer on [EIP-7251](https://eips.ethereum.org/EIPS/eip-7251)--a proposal to increase maximum effective balance for validators with implications for validator rewards and penalties 
- Added an analysis of changes to slashing/penalty mechanisms under EIP-7251
@github-actions github-actions bot added the content 🖋️ This involves copy additions or edits label Nov 23, 2024
Copy link

netlify bot commented Nov 23, 2024

Deploy Preview for ethereumorg failed.

Name Link
🔨 Latest commit d71d0a3
🔍 Latest deploy log https://app.netlify.com/sites/ethereumorg/deploys/674128cc3c99520008dd86d1

Copy link
Contributor

This issue is stale because it has been open 30 days with no activity.

@github-actions github-actions bot added the Status: Stale This issue is stale because it has been open 30 days with no activity. label Dec 23, 2024
Copy link

gitguardian bot commented Dec 30, 2024

⚠️ GitGuardian has uncovered 1 secret following the scan of your pull request.

Please consider investigating the findings and remediating the incidents. Failure to do so may lead to compromising the associated services or software components.

Since your pull request originates from a forked repository, GitGuardian is not able to associate the secrets uncovered with secret incidents on your GitGuardian dashboard.
Skipping this check run and merging your pull request will create secret incidents on your GitGuardian dashboard.

🔎 Detected hardcoded secret in your pull request
GitGuardian id GitGuardian status Secret Commit Filename
- - Generic High Entropy Secret 602d37b src/data/community-events.json View secret
🛠 Guidelines to remediate hardcoded secrets
  1. Understand the implications of revoking this secret by investigating where it is used in your code.
  2. Replace and store your secret safely. Learn here the best practices.
  3. Revoke and rotate this secret.
  4. If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.

To avoid such incidents in the future consider

If this detection is a false positive, please contact Oleh Vasylenko (@Aldekein) to fix it in the GitGuardian dashboard.


🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.

@corwintines corwintines merged commit 6cebfbc into ethereum:dev Feb 25, 2025
2 of 6 checks passed
This was referenced Feb 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
content 🖋️ This involves copy additions or edits Status: Stale This issue is stale because it has been open 30 days with no activity.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants