Announcing Counter Stake Stage 2 ‘The Grand Staking League’ Full Details

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake is Matic's experimental testing event for everyone wishing to participate in the Matic network, by validating, testing the network's limitations and earning mainnet MATIC tokens by showcasing technical skills. Counter Stake allows one to compete with other validators on our testnet and earn rewards.

Counter Stake comprises of 3 stages:

What Happened in Stage 0?

During this stage validators were able to:

  • Understand the core components
  • Get their hands on setting up the nodes
  • Run their nodes and keeping them synced
  • Get familiar with the setup process and core components

What Happened in Stage 1?

During Stage 1, validators were able to:

  • Set up their node
  • Stake on Matic through CLI or Dashboard
  • Delegate to a validator
  • Claim and re-stake their rewards
  • Replace validators via an on-chain auction process
  • And unstake from the network

For more details on Stage 1, we released a blog post highlighting all the important points and milestones we achieved:

During Stage 1 we ran a network which included 100 validators running their individual nodes for Matic. We then tested out all the important functionalities of Matic, such as becoming a validator, delegating to a validator, signing checkpoints, claiming rewards, etc.

And now this brings us to Stage 2!

What Will Stage 2 Involve?

Stage 2 is where we want our network to be "stress-tested" thoroughly. What this basically means is that we will be encouraging validators to:

  • Test the network for resilience against explicit exploits that take down the network
  • Try to successfully execute an economic attack and find bugs in the system/code

Important Links

Getting Started on Stage 2

In order to perform attacks correctly, we encourage validators and community members to gain an understanding of Matic's architecture and code. Without a thorough understanding of core components such as Heimdall and Bor, it would be difficult to perform attacks correctly on the network.

The Matic architecture is comprised of the following 3 layers:

  • Heimdall - Heimdall is the heart of the Matic system. It manages validators, block producer committee selection, span duration, checkpoints, the state-sync mechanism and other essential aspects of the system.
  • Bor - The block producer layer for Matic
  • Smart contracts on Ethereum - Staking, delegation and Plasma contracts

Get started by going through the Matic architecture documentation here:

Specs can be found here:

Codebase can be found here:

In case you have an doubts or questions regarding anything, you can ask us in the Counter Stake Discord channel or you could post it on our Dev Forum here:


You'll need to be running a node, and one that is functioning at an optimum level. This includes uptime above 95%, Heimdall and Bor nodes running correctly, as well as Bridge and Rest-server running too.

We recommend all validators to run their own Sentry Nodes in addition to the regular nodes. Running a sentry node makes you more resilient to certain attacks such as DDoS.

We will be releasing detailed information on Sentry Node setup shortly.

Objectives of Stage 2

There will be several activities to be performed by validators during Stage 2. Validators will be encouraged to conduct attacks against the network - economic attacks or those based on bugs in the code. Reporting attacks without executing them but providing an overview of how to execute them will also be considered.

There are 3 major objectives for Stage 2:

  • Network Attacks - This will include economic attacks and those based on bugs in the code. We have mentioned a list of example attacks that a validator could execute below.
  • Uptime - For running a successful network, running your node and maintaining a high uptime is of the utmost importance. For Stage 2 this will be a major objective and reward criterion.
  • Objective Tasks - There will be multiple minor tasks, not related to attacks. These tasks are optional, but by performing them validators will earn additional rewards.

Total Reward Pool for Stage 2

Network Attacks

Here is a list of example network attacks that validators could execute:

More from the Polygon Blog
Data Availability is Not Data Storage

Recall this grade school experience: you raise your hand and ask, “Can I go to the bathroom?” To which your teacher responds with “I don’t know. Can you?” Might seem far fetched, but this is a perfect entry point to understanding the difference between data availability and data storage. Let's bring this analogy close to […]

Read More
The Future is Now for Ethereum Scaling: Introducing Polygon zkEVM

We all know that Ethereum needs to scale, and we at Polygon believe that zero-knowledge (ZK) tech is the most promising pathway to get there. But that path has often seemed as if it would be long and winding. The conventional wisdom has been that the crypto space would need many years to develop Layer […]

Read More
Polygon Reaches First Sustainability Milestone by Achieving Network Carbon Neutrality

Polygon has made a major first step toward becoming carbon negative with the retirement of $400,000 in carbon credits representing 104,794 tonnes of greenhouse gasses, or the entirety of the network’s CO2 debt since inception.  The milestone comes after Polygon in mid-April released its Green Manifesto, part of its broader vision for sustainable development. The […]

Read More
Polygon Avail Launches on Testnet to Turn Monolithic Chains Modular

If we want the entire world to join Web3, blockchains will need to handle more transactions. Monolithic blockchains can’t scale because they’re asked to perform too many tasks (execution, settlement, and data availability) at once. But if chains were able to focus on just one part of the stack at a time, the entire ecosystem […]

Read More
Plonky2 is Now Open-Source

Earlier this year, Polygon announced Plonky2, a zero-knowledge proving system that represents a major breakthrough for ZK tech. Plonky2 offers two main benefits: incredibly fast proofs and extremely efficient recursive proofs. It’s a huge leap forward for the ZK space, and we’ve been blown away by the response from the developer community: people want to […]

Read More
The Complete Beginner’s Guide to NFTs on Polygon

Ever wanted to learn how to buy NFTs, or are you looking for a new platform to do it? Then you might want to consider Polygon.  Learning about NFTs can be a big jungle, but on Polygon, we make it simple to get started through our beginner-friendly ecosystem. Buy NFTs with low gas fees and […]

Read More
Polygon is Now Home to Over 37,000 DApps

More than 37,000 decentralized apps (dApps) have been built on Polygon, according to latest data from Alchemy, the world's leading Web3 development platform. That’s almost double the number in March and a fourfold increase since the start of the year. The number of monthly active teams, the most direct measure of developer activity on the […]

Read More