- Submitting invalid proofs
- Extended downtime
- Malicious behavior
- Protocol violations
- Maintain network integrity
- Ensure active participation
- Prevent gaming of the system
- Protect against coordinated attacks
- Type of violation
- Impact on network
- History of validator behavior
- Intent of the violation