Announcing Counter Stake Stage 2 ‘The Grand Staking League’ Full Details

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake comprises of 3 stages:

What Happened in Stage 0?

During this stage validators were able to:

  • Understand the core components
  • Get their hands on setting up the nodes
  • Run their nodes and keeping them synced
  • Get familiar with the setup process and core components

What Happened in Stage 1?

During Stage 1, validators were able to:

  • Set up their node
  • Stake on Matic through CLI or Dashboard
  • Delegate to a validator
  • Claim and re-stake their rewards
  • Replace validators via an on-chain auction process
  • And unstake from the network

For more details on Stage 1, we released a blog post highlighting all the important points and milestones we achieved:

During Stage 1 we ran a network which included 100 validators running their individual nodes for Matic. We then tested out all the important functionalities of Matic, such as becoming a validator, delegating to a validator, signing checkpoints, claiming rewards, etc.

And now this brings us to Stage 2!

What Will Stage 2 Involve?

Stage 2 is where we want our network to be "stress-tested" thoroughly. What this basically means is that we will be encouraging validators to:

  • Test the network for resilience against explicit exploits that take down the network
  • Try to successfully execute an economic attack and find bugs in the system/code

Important Links

Getting Started on Stage 2

In order to perform attacks correctly, we encourage validators and community members to gain an understanding of Matic's architecture and code. Without a thorough understanding of core components such as Heimdall and Bor, it would be difficult to perform attacks correctly on the network.

The Matic architecture is comprised of the following 3 layers:

  • Heimdall - Heimdall is the heart of the Matic system. It manages validators, block producer committee selection, span duration, checkpoints, the state-sync mechanism and other essential aspects of the system.
  • Bor - The block producer layer for Matic
  • Smart contracts on Ethereum - Staking, delegation and Plasma contracts

Get started by going through the Matic architecture documentation here:

Specs can be found here:

Codebase can be found here:

In case you have an doubts or questions regarding anything, you can ask us in the Counter Stake Discord channel or you could post it on our Dev Forum here:


You'll need to be running a node, and one that is functioning at an optimum level. This includes uptime above 95%, Heimdall and Bor nodes running correctly, as well as Bridge and Rest-server running too.

We recommend all validators to run their own Sentry Nodes in addition to the regular nodes. Running a sentry node makes you more resilient to certain attacks such as DDoS.

We will be releasing detailed information on Sentry Node setup shortly.

Objectives of Stage 2

There will be several activities to be performed by validators during Stage 2. Validators will be encouraged to conduct attacks against the network - economic attacks or those based on bugs in the code. Reporting attacks without executing them but providing an overview of how to execute them will also be considered.

There are 3 major objectives for Stage 2:

  • Network Attacks - This will include economic attacks and those based on bugs in the code. We have mentioned a list of example attacks that a validator could execute below.
  • Uptime - For running a successful network, running your node and maintaining a high uptime is of the utmost importance. For Stage 2 this will be a major objective and reward criterion.
  • Objective Tasks - There will be multiple minor tasks, not related to attacks. These tasks are optional, but by performing them validators will earn additional rewards.

Total Reward Pool for Stage 2

Network Attacks

Here is a list of example network attacks that validators could execute:

More from the Polygon Blog
Introducing Plonky2

Polygon Zero’s mission is simple: to use zero-knowledge proofs to scale Ethereum to a billion users, without compromising decentralization or security. Achieving this requires fast and efficient proof systems. Today, we’re excited to share Plonky2, a major milestone for zero-knowledge cryptography. Plonky2 is a recursive SNARK that is 100x faster than existing alternatives and natively […]

Read More
Polygon Takes A Major Lead In ZK Rollups; Welcomes Mir, A Groundbreaking ZK Startup In A $400M Deal

TL;DR: We are excited to announce that Mir, a startup building groundbreaking ZK tech, is joining the Polygon family in a $400M* deal. Mir gathered a team of talented cryptographers and engineers, and after almost two years of work developed the world’s fastest ZK scaling technology. The Mir team is now joining Polygon in order […]

Read More
Polygon Announces Polygon Miden - A STARK-Based, Ethereum-Compatible Rollup

TL;DR: We are excited to announce the newest member of the Polygon solution suite - Polygon Miden, an upcoming STARK-based, EVM-compatible rollup. The project is led by Bobbin Threadbare, former Facebook’s core ZK researcher who led the development of Winterfell. Today we are releasing Polygon Miden’s core component - Miden VM, the first open-source STARK-based […]

Read More
Why Web3 Developers Are Choosing Polygon Over Other Solutions 

When it comes to deploying on Ethereum, there is only one place that lets developers easily migrate their projects, offers a broad range of scaling options and has some of the industry’s lowest transaction rates. These are just some of the reasons why the number of teams using Polygon jumped 100-fold in the past year. […]

Read More
Polygon’s Breakthrough Year: 2021 in Review

Welcome to 2022! This is shaping up to be another amazing year for the Polygon ecosystem. But after an absolutely breakthrough 2021, it's got big shoes to fill. Over the past year, Polygon made big strides toward accomplishing its mission of bringing the next billion users to Ethereum. The network’s low-fee infrastructure attracted some of […]

Read More
All You Need to Know About the Recent Network Upgrade

Earlier this month, Polygon’s core development team with help from bug bounty  platform Immunefi successfully fixed a critical network vulnerability. Considering the nature of this upgrade, it had to be executed without attracting too much attention. We are now ready to give the full account of what happened. A group of whitehat hackers notified Immunefi, […]

Read More