Unusual attack surfaces in proof of stake networks during rapid validator churn