← Back to Pulse
Aztec logoOperationsAztecBlockchainWatch

Aztec Sequencer Ops: Slashing Is a Vote, Keys Don’t Rotate, and Sync Choices Matter

If you operate Aztec infra, the sharp edges aren’t “setup commands” — they’re consensus-driven enforcement and irreversible protocol keys.

BitCtrl PulseOps & Security DeskFeb 22, 20265 min read
Aztec network operations visual

Aztec Sequencer Ops: Slashing Is a Vote, Keys Don’t Rotate, and Sync Choices Matter

Overview

Aztec’s operator docs make one thing clear: slashing is not an automatic “chain punishes you” mechanism. It’s a consensus-based voting system where sequencers detect offenses via watchers and then vote during block proposals on which validators from earlier rounds should be slashed. (docs.aztec.network) That means “being safe” is partly a social/consensus reality: your node participates in the process that decides guilt.

Execution is also deliberately buffered. After votes are tallied, slashing rounds become executable only after an execution delay (~3 days), and when a round is ready, proposers can include the execution call that triggers the L1 contract to slash validators that reached quorum. (docs.aztec.network) Aztec adds a failsafe: a Slashing Vetoer, described as an independent security group that can pause slashing during the delay to protect validators from unfair slashing due to client bugs. (docs.aztec.network) Inactivity enforcement also has a hidden dependency: some offenses require the Sentinel to be enabled (SENTINEL_ENABLED=true) to track validator activity. (docs.aztec.network)

Context

Key management is the second non-obvious trap. Aztec distinguishes between protocol keys (e.g., nullifier and incoming viewing) and signing keys. Protocol keys cannot be rotated because they’re embedded in the address (immutable); if compromised, the remediation is deploying a new account. (docs.aztec.network) Signing keys, by contrast, can be rotatable depending on the account contract design — which is why the ops posture should treat protocol keys as “one-way doors” and push all routine operational signing into hardened, replaceable signing infrastructure.

Sources

Key Takeaways
  • Slashing is consensus-driven: sequencers run watchers and vote on offenses during proposals; L1 slashes only when quorum is reached. (docs.aztec.network)
  • There’s a safety buffer: slashing has an ~3-day execution delay and an independent Slashing Vetoer can pause execution to mitigate client-bug risk. (docs.aztec.network)
  • Protocol keys don’t rotate: nullifier/incoming viewing keys are immutable; compromise generally means new account deployment. (docs.aztec.network)
  • Ops posture should assume failures: use remote signers/HSMs for production and prefer snapshot-based sync modes for faster recovery. (docs.aztec.network)
operationsaztecwatchvalidator-opssecuritynetwork-healthoperator-playbookoperators