Risks of an in-protocol redistribution design
Without safeguards or certain assumptions, redistribution increases the incentive to compromise AVSs and Operators because it enables an attacker to steal slashed or slashable stake. Two key attack vectors illustrate the potential vulnerabilities with enabling a specific implementation of redistribution in protocol.
See article here