type of cyber/attacks involving malicious behavior
in proof of stake consensus
where a validator signs two different blocks at the same block height
effectively supporting multiple forks of the blockchain
this can compromise the liveness and security of the network
by creating conflicting versions of the blockchain
to prevent and mitigate consensus implement measures such as double sign protection