
40% of Sui Validators Exposed
Why Sui’s Poor Hygiene Puts Consensus, and User Assets, at Risk

Protecting the Decentralized Edge with PGDN
Most people assume validator infrastructure is secure by default. The (potential) future of banking should be secure right? With all the recent crypto breaches, we assumed things would be protected. What we actually found was quite a shock. PGDN is an AI-powered platform built to protect the decentralized edge, not by reacting to threats, but by proactively surfacing the weak points that make them possible. PGDN is an agentic detection system: a purpose-built infrastructure intelligence layer...

Publishing Infrastructure Scores
On-Chain and In Public
<100 subscribers



40% of Sui Validators Exposed
Why Sui’s Poor Hygiene Puts Consensus, and User Assets, at Risk

Protecting the Decentralized Edge with PGDN
Most people assume validator infrastructure is secure by default. The (potential) future of banking should be secure right? With all the recent crypto breaches, we assumed things would be protected. What we actually found was quite a shock. PGDN is an AI-powered platform built to protect the decentralized edge, not by reacting to threats, but by proactively surfacing the weak points that make them possible. PGDN is an agentic detection system: a purpose-built infrastructure intelligence layer...

Publishing Infrastructure Scores
On-Chain and In Public
Share Dialog
Share Dialog
Quick Take
Recent Ethereum validator slashings (via SSV Labs ecosystem) highlight how fragile staking infra can be when key management or security hygiene fails.
PGDN.ai’s analysis shows nearly 40% of Sui validator voting power is exposed — not from a single mistake, but systemic misconfigurations and poor security practice.
Without addressing these weaknesses, Sui risks far worse than slashing: a potential consensus stall affecting billions in assets.
There's a great article about the slashing incident on The Block.
This week, SSV Labs CEO Alon Muroch reassured the Ethereum staking community after several validators suffered slashing incidents. According to SSV, the protocol itself wasn’t compromised; instead, external key management errors by operators triggered the failures.
The takeaway was clear: even with strong protocol-level design, validator operators remain a weak link. Misconfigurations and operational mistakes can still lead to costly penalties, and reputational damage for the entire network.
If slashing from key mismanagement is painful, what PGDN.ai found on Sui is potentially catastrophic.
We scanned the entire Sui validator set and found nearly 40% of validator voting power exposed:
Open SSH ports across core validators.
Critical CVEs left unpatched (28% of validators).
Default Apache landing pages exposed to the public internet.
Docker port 2375 open on ~99% of validators, often with no firewall.
Unlike SSV’s incident, where the design worked but operators slipped, Sui’s issues point to systemic secops failures across the validator set.
In proof-of-stake, slashing isn’t the only danger. If more than ~33% of validator voting power drops offline, consensus stalls. If the network halts, billions in assets could be frozen.
With 40% of voting power exposed, an attacker doesn’t need to “double sign” or exploit protocol bugs. They just need to take down enough vulnerable validators simultaneously to cross that threshold.
Mysten Labs promotes Sui as "building critical infrastructure to enable a more decentralized internet." Yet when these issues were disclosed responsibly, the response was dismissive - "bug bounty" fodder rather than systemic risk.
Meanwhile, competitor Aptos came up clean on our first pass. Ironically, the chain with the biggest marketing spend may also have the weakest validator hygiene.
The lesson from both SSV’s slashing incident and Sui’s exposures is that validator security is infrastructure security. Protocol design isn’t enough; the culture of secops among validator operators is just as critical.
Sui’s validators aren’t slashing today - but unless the hygiene gap is closed, the next headline could be worse than penalties. It could be a chain-wide stall.
Full Report: https://github.com/pgdn-network/sui-network-report-250819
Quick Take
Recent Ethereum validator slashings (via SSV Labs ecosystem) highlight how fragile staking infra can be when key management or security hygiene fails.
PGDN.ai’s analysis shows nearly 40% of Sui validator voting power is exposed — not from a single mistake, but systemic misconfigurations and poor security practice.
Without addressing these weaknesses, Sui risks far worse than slashing: a potential consensus stall affecting billions in assets.
There's a great article about the slashing incident on The Block.
This week, SSV Labs CEO Alon Muroch reassured the Ethereum staking community after several validators suffered slashing incidents. According to SSV, the protocol itself wasn’t compromised; instead, external key management errors by operators triggered the failures.
The takeaway was clear: even with strong protocol-level design, validator operators remain a weak link. Misconfigurations and operational mistakes can still lead to costly penalties, and reputational damage for the entire network.
If slashing from key mismanagement is painful, what PGDN.ai found on Sui is potentially catastrophic.
We scanned the entire Sui validator set and found nearly 40% of validator voting power exposed:
Open SSH ports across core validators.
Critical CVEs left unpatched (28% of validators).
Default Apache landing pages exposed to the public internet.
Docker port 2375 open on ~99% of validators, often with no firewall.
Unlike SSV’s incident, where the design worked but operators slipped, Sui’s issues point to systemic secops failures across the validator set.
In proof-of-stake, slashing isn’t the only danger. If more than ~33% of validator voting power drops offline, consensus stalls. If the network halts, billions in assets could be frozen.
With 40% of voting power exposed, an attacker doesn’t need to “double sign” or exploit protocol bugs. They just need to take down enough vulnerable validators simultaneously to cross that threshold.
Mysten Labs promotes Sui as "building critical infrastructure to enable a more decentralized internet." Yet when these issues were disclosed responsibly, the response was dismissive - "bug bounty" fodder rather than systemic risk.
Meanwhile, competitor Aptos came up clean on our first pass. Ironically, the chain with the biggest marketing spend may also have the weakest validator hygiene.
The lesson from both SSV’s slashing incident and Sui’s exposures is that validator security is infrastructure security. Protocol design isn’t enough; the culture of secops among validator operators is just as critical.
Sui’s validators aren’t slashing today - but unless the hygiene gap is closed, the next headline could be worse than penalties. It could be a chain-wide stall.
Full Report: https://github.com/pgdn-network/sui-network-report-250819
No comments yet