Verifiable delay functions and RANDAO manipulability

Ah, I found Verifiable delay functions and attacks. Also for reference for others there is RANDAO beacon exploitability analysis, round 2.