Announcing Counter Stake Stage 2 ‘The Grand Staking League’ Full Details

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake comprises of 3 stages:

What Happened in Stage 0?

During this stage validators were able to:

  • Understand the core components
  • Get their hands on setting up the nodes
  • Run their nodes and keeping them synced
  • Get familiar with the setup process and core components

What Happened in Stage 1?

During Stage 1, validators were able to:

  • Set up their node
  • Stake on Matic through CLI or Dashboard
  • Delegate to a validator
  • Claim and re-stake their rewards
  • Replace validators via an on-chain auction process
  • And unstake from the network

For more details on Stage 1, we released a blog post highlighting all the important points and milestones we achieved:

During Stage 1 we ran a network which included 100 validators running their individual nodes for Matic. We then tested out all the important functionalities of Matic, such as becoming a validator, delegating to a validator, signing checkpoints, claiming rewards, etc.

And now this brings us to Stage 2!

What Will Stage 2 Involve?

Stage 2 is where we want our network to be "stress-tested" thoroughly. What this basically means is that we will be encouraging validators to:

  • Test the network for resilience against explicit exploits that take down the network
  • Try to successfully execute an economic attack and find bugs in the system/code

Important Links

Getting Started on Stage 2

In order to perform attacks correctly, we encourage validators and community members to gain an understanding of Matic's architecture and code. Without a thorough understanding of core components such as Heimdall and Bor, it would be difficult to perform attacks correctly on the network.

The Matic architecture is comprised of the following 3 layers:

  • Heimdall - Heimdall is the heart of the Matic system. It manages validators, block producer committee selection, span duration, checkpoints, the state-sync mechanism and other essential aspects of the system.
  • Bor - The block producer layer for Matic
  • Smart contracts on Ethereum - Staking, delegation and Plasma contracts

Get started by going through the Matic architecture documentation here:

Specs can be found here:

Codebase can be found here:

In case you have an doubts or questions regarding anything, you can ask us in the Counter Stake Discord channel or you could post it on our Dev Forum here:


You'll need to be running a node, and one that is functioning at an optimum level. This includes uptime above 95%, Heimdall and Bor nodes running correctly, as well as Bridge and Rest-server running too.

We recommend all validators to run their own Sentry Nodes in addition to the regular nodes. Running a sentry node makes you more resilient to certain attacks such as DDoS.

We will be releasing detailed information on Sentry Node setup shortly.

Objectives of Stage 2

There will be several activities to be performed by validators during Stage 2. Validators will be encouraged to conduct attacks against the network - economic attacks or those based on bugs in the code. Reporting attacks without executing them but providing an overview of how to execute them will also be considered.

There are 3 major objectives for Stage 2:

  • Network Attacks - This will include economic attacks and those based on bugs in the code. We have mentioned a list of example attacks that a validator could execute below.
  • Uptime - For running a successful network, running your node and maintaining a high uptime is of the utmost importance. For Stage 2 this will be a major objective and reward criterion.
  • Objective Tasks - There will be multiple minor tasks, not related to attacks. These tasks are optional, but by performing them validators will earn additional rewards.

Total Reward Pool for Stage 2

Network Attacks

Here is a list of example network attacks that validators could execute:

More from the Polygon Blog
EY and Polygon to co-develop Ethereum scaling solutions for enterprises and launch Polygon Nightfall - a privacy-focused Rollup

14th September - EY, a global professional services and technology firm, is collaborating with Polygon on building and implementing scaling and enterprise solutions for the Ethereum ecosystem. As part of this collaboration, EY and Polygon will work on Polygon Nightfall, a public, privacy-focused Rollup. In addition to this, EY will offer its other flagship blockchain […]

Read More
Polygon: First Scaling Solution for Coinbase

The Protocol team was recently established at Coinbase to work on scaling Ethereum through integration with L2 and other ETH scaling solutions. The Coinbase team plans to integrate Polygon PoS as their first scaling solution for Coinbase. The Coinbase Protocol team is an experienced group of engineers at Coinbase focused on contributing to scaling blockchains and […]

Read More
Hermez Network is Joining Polygon and Becoming Polygon Hermez via the First Full-Blown Merger of Two Blockchain Networks

We are proud and excited to announce that Hermez, one of the most prominent zero-knowledge (ZK) cryptography-based scaling projects and teams, will be joining Polygon. Starting today, we will initiate the process of merging Hermez into the Polygon ecosystem, where it will be operating under the new name: Polygon Hermez. Polygon Hermez will become a part of […]

Read More
Polygon Bug Bounty Program Is Live On Immunefi!

Polygon’s bug bounty program on Immunefi, DeFi's leading bug bounty platform, is now live with a maximum bounty of $2,000,000. If you are a security researcher looking to venture out into the blockchain space, this is your chance to understand how things function. This bug bounty program is focused on smart contracts with an essential […]

Read More
Meet Polygon Team At Messari Mainnet!

Polygon team members will be speaking at Messari Mainnet in New York City on September 21-22. We also have a booth at the conference, so come meet us and learn about Polygon! Here are some of the talks you can’t miss: On September 21, at 2:20 pm, Dean Thomas, Head of Institutional Capital, will speak […]

Read More
What do you prefer - Maximum Security or Cheaper Transactions?

The Ethereum scaling solutions space has been heating up lately. Which is a good thing, because Ethereum (and its community) needs scaling as soon as possible. As you know, Polygon's mission is to develop various kinds of Ethereum scaling solutions, from sidechains to rollups (and more). But all these solutions come with trade-offs. There's no […]

Read More