Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Transaction Proposal

A transaction proposal is a pending transaction awaiting approval from required signers in a multi-signature wallet or smart contract account.
Chainscore © 2026
definition
BLOCKCHAIN GLOSSARY

What is a Transaction Proposal?

A Transaction Proposal is a structured, unsigned data packet that specifies the details of an intended blockchain operation before it is authorized and broadcast to the network.

In blockchain systems, a Transaction Proposal (often called an unsigned transaction) is the initial, user-constructed draft of an operation. It contains all the necessary metadata for the network to execute a state change, such as - the recipient's address, - the amount of cryptocurrency or tokens to transfer, - the transaction fee (gas in Ethereum), and - any encoded data for smart contract interactions. Crucially, it lacks the cryptographic signatures required for network validation, making it non-executable in its proposed state.

The proposal serves as the payload for the signing process. Wallets and clients present this structured data to the user or a signing authority (like a hardware wallet or multi-signature service) for approval. Once signed, the cryptographic proof of authorization is appended, transforming the proposal into a valid, signed transaction ready for propagation to the network's mempool. This separation between proposal and signature is fundamental for security, enabling offline signing and review of transaction details.

Transaction Proposals are central to advanced wallet architectures and dApps. For instance, a decentralized exchange dApp will generate a proposal for a token swap, which a user's wallet then signs. In enterprise or institutional settings, proposals are often routed through compliance or multi-signature workflows. The format is typically standardized, such as Ethereum's RLP-encoded transaction object or Solana's TransactionInstruction, ensuring compatibility across different clients and signers in the ecosystem.

how-it-works
BLOCKCHAIN MECHANICS

How a Transaction Proposal Works

A transaction proposal is the initial, user-signed message that requests a change to the state of a blockchain network, such as transferring tokens or interacting with a smart contract.

A transaction proposal is a cryptographically signed data structure that specifies the desired state change. It is created in a user's wallet application and contains essential fields like the sender address, recipient address, amount, gas limit, and a digital signature. This signature, generated using the sender's private key, proves ownership and authorizes the transaction. The proposal is then broadcast to the network's peer-to-peer network, where it enters a pool of pending transactions, often called the mempool or transaction pool.

Once in the mempool, network validators (e.g., miners in Proof of Work or stakers in Proof of Stake) select transactions to include in the next block. They prioritize transactions based on factors like the attached transaction fee or gas price. The validator then executes the proposed operations within their node's local copy of the Ethereum Virtual Machine (EVM) or equivalent runtime environment to verify its validity—checking the signature, the sender's balance, and the smart contract logic.

If the execution is successful and the proposal is deemed valid, the validator packages it into a new block. This block is then propagated and added to the blockchain through the network's consensus mechanism. The transaction's outcome—success or failure—is recorded immutably. A failed transaction (e.g., due to insufficient gas or a reverted smart contract) is still included on-chain and consumes gas, but does not alter the state as intended. This entire process ensures that only authorized and valid state changes are permanently recorded.

key-features
BLOCKCHAIN GLOSSARY

Key Features of a Transaction Proposal

A transaction proposal is a structured data object containing the essential information needed to execute an action on a blockchain. It is the fundamental unit of user intent, awaiting signature and submission to the network.

01

Target Address

The destination for the transaction's payload. This is typically a smart contract address for function calls or an externally owned account (EOA) for simple value transfers. The target is immutable once the proposal is constructed.

02

Calldata

The encoded function call and its arguments. For an ERC-20 transfer, this includes the recipient's address and the amount. For complex DeFi interactions, it encodes the function selector and all required parameters. This is the core 'instruction' for the smart contract.

03

Value

The amount of native blockchain currency (e.g., ETH, MATIC, AVAX) to be sent alongside the transaction. This field is critical for payable functions, staking operations, or simple transfers. It is often specified in wei, the smallest unit of the native token.

04

Gas Parameters

Settings that determine the transaction's execution cost and priority.

  • Gas Limit: The maximum computational units the user is willing to pay for.
  • Max Fee & Priority Fee (EIP-1559): The maximum total fee per gas and the tip for the validator, defining transaction speed and cost.
05

Nonce

A unique, sequential number assigned to each transaction from a specific account. It prevents replay attacks and ensures the correct order of execution. The network will only accept a transaction with the next expected nonce for the sender's address.

06

Chain ID

A unique identifier for the specific blockchain network (e.g., 1 for Ethereum Mainnet, 137 for Polygon). This is a critical security feature that prevents a transaction signed for one network from being maliciously replayed on another, protecting users from cross-chain replay attacks.

examples
GOVERNANCE IN ACTION

Examples of Transaction Proposals

Transaction proposals are the primary mechanism for executing on-chain changes in decentralized governance. These examples illustrate common types of proposals across major protocols.

04

Delegation & Voting Power

A proposal to change delegation rules or the distribution of voting power within the governance system itself.

  • Example: A proposal to implement vote delegation features or adjust quorum thresholds.
  • Example: Minting new governance tokens for a contributor grant, which increases total supply and voting power.
  • Meta-Governance: These proposals govern the governance process.
05

Emergency Action

A time-sensitive proposal to mitigate a security vulnerability, exploit, or critical failure. These often bypass standard timelocks via a guardian or emergency multisig.

  • Example: Pausing all borrowing/lending markets on a money market protocol after a vulnerability is discovered.
  • Example: Freezing funds in a compromised bridge contract.
  • Trade-off: Balances speed of response against decentralization principles.
06

Cross-Chain Governance

A proposal whose execution requires an action on a different blockchain, facilitated by cross-chain messaging protocols like LayerZero or Wormhole.

  • Example: A DAO on Ethereum voting to deploy liquidity or adjust parameters on an Arbitrum or Optimism deployment.
  • Execution Path: Vote is finalized on mainnet, a message is relayed, and a relayer or executor performs the action on the destination chain.
etymology
TERMINOLOGY

Etymology and Origin

The term 'transaction proposal' is a compound noun that describes a specific, foundational action within blockchain protocols, particularly those using account-based models or consensus mechanisms requiring explicit validation.

The word transaction originates from the Latin transactio, meaning 'an agreement' or 'a carrying through.' In computing, it denotes a unit of work that changes a system's state. Proposal stems from the Latin proponere, 'to put forward.' Combined, a transaction proposal is a formally structured message put forward by a user or client to initiate a state change on the network. This linguistic construction precisely captures its function: it is not an executed action but a suggestion for one, requiring network consensus for completion.

In the context of blockchain, the concept evolved from the need to distinguish between a user's intent and the network's validated action. Early systems like Bitcoin used the term 'transaction' for the signed data structure itself. However, with the advent of more complex, stateful platforms like Ethereum and consensus algorithms like Proof-of-Stake, the intermediary step of proposing a transaction became a distinct protocol phase. This is especially critical in systems where a transaction must be gossiped to the network, included in a block by a block proposer, and then executed and validated by other nodes.

The terminology is now standard in developer documentation for networks such as Ethereum, Cosmos, and Polkadot. When a user signs a transaction with their private key, they create a transaction proposal. This proposal contains all necessary metadata—nonce, gas, recipient, data payload—and is cryptographically signed to prove authorization. It is then broadcast to the network, where it awaits inclusion in the mempool and subsequent processing. This clear separation of proposal, propagation, and finalization is central to understanding blockchain transaction lifecycles and security models.

ecosystem-usage
TRANSACTION PROPOSAL

Ecosystem Usage

A transaction proposal is a structured request for a blockchain transaction, often used in governance or multi-signature wallets to coordinate execution. It is the formal mechanism for initiating a change that requires approval.

03

Parameter Changes

Many DeFi protocols and Layer 1/Layer 2 networks use transaction proposals to modify system parameters. Examples include:

  • Adjusting interest rates or collateral factors in a lending market.
  • Changing validator rewards or gas fees on a blockchain.
  • Updating the whitelist for a decentralized exchange. These proposals are critical for the adaptive, community-led management of live protocols.
04

Smart Contract Upgrades

For protocols using upgradeable proxy patterns, a transaction proposal is the primary method to deploy and switch to a new implementation contract. This process is highly sensitive, as it can change the core logic of the system. Proposals typically include the new contract's address and require extensive testing, audits, and a high approval quorum before execution to mitigate risk.

05

Submission & Lifecycle

The lifecycle of a transaction proposal follows a standard pattern:

  1. Drafting & Simulation: The proposer defines the target, calldata, and value, often simulating it on a testnet.
  2. Submission: The proposal is posted on-chain or to an off-chain service like Snapshot.
  3. Discussion & Voting: A defined voting period begins, allowing stakeholders to debate and cast votes.
  4. Queueing & Execution: If approved, the proposal is queued (often with a timelock delay) and finally executed by a privileged address or automated executor.
06

Security Considerations

Transaction proposals introduce specific attack vectors that must be mitigated. Key security models include:

  • Timelocks: A mandatory delay between proposal approval and execution, allowing users to exit if a malicious proposal passes.
  • Multisig Thresholds: Requiring a minimum number of independent signers prevents a single point of failure.
  • Proposal Sponsorship: Some systems require a deposit to submit a proposal, which is slashed if the proposal is deemed spam or malicious, protecting against governance attacks.
security-considerations
TRANSACTION PROPOSAL

Security Considerations

A transaction proposal is a request for a user or smart contract to sign and execute a specific on-chain operation. The security of this process is paramount, as it involves authorizing the transfer of assets or the execution of code.

01

Malicious Payloads

A proposal can contain hidden malicious code or unintended side effects. Key risks include:

  • Reentrancy attacks where a contract call allows an attacker to re-enter and drain funds.
  • Unchecked external calls that transfer control to an untrusted contract.
  • Signature replay attacks where a signed proposal is submitted multiple times on different chains or contracts. Always decode and simulate the proposal's full effects before signing.
02

Permission & Authorization

Proposals must be validated against the signer's permissions. Critical checks involve:

  • Spending limits: Does the proposal exceed approved token allowances or wallet balances?
  • Role-based access: In multi-signature wallets or DAOs, does the proposer have the correct role (e.g., treasurer) for this action?
  • Delegate calls: Proposals using delegatecall can modify the state of the calling contract, a high-risk operation requiring explicit scrutiny.
03

Front-Running & MEV

Transaction proposals are visible in the public mempool before execution, creating exploitation vectors:

  • Sandwich attacks: A malicious actor places orders before and after a victim's trade to profit from price impact.
  • Time-bandit attacks: Validators can reorder or censor transactions for maximal extractable value (MEV). Mitigations include using private transaction relays, commit-reveal schemes, or submitting proposals directly to trusted validators.
04

Simulation & Gas Estimation

Failing to properly simulate a proposal can lead to irreversible loss. Essential practices are:

  • Dry-run execution: Use an eth_call RPC to simulate the transaction on a forked network state without broadcasting.
  • Accurate gas estimation: Underestimating gas can cause the transaction to revert, wasting fees; overestimating wastes funds. Tools like Tenderly and OpenZeppelin Defender provide simulation environments.
  • State validation: Confirm the simulation uses the exact same state (block number, storage) as the live network.
05

User Interface & Phishing

The interface presenting the proposal is a critical attack surface. Common threats include:

  • Spoofed domains: Fake wallet interfaces that mimic legitimate sites to steal signatures.
  • Malicious transaction decoders: Browser extensions or wallet plugins that intentionally misrepresent proposal data.
  • Blind signing: Signing proposals where the data is encoded or unreadable, hiding its true intent. Always verify the requesting domain and use wallets that display human-readable transaction summaries.
06

Multi-Sig & Governance Safeguards

For proposals in decentralized organizations or treasuries, additional procedural security is required:

  • Timelocks: A mandatory delay between proposal approval and execution, allowing time to review and potentially cancel malicious actions.
  • Quorum requirements: A minimum threshold of participation must be met for a proposal to be valid, preventing minority attacks.
  • Execution separation: The roles of proposing, voting, and executing a transaction should be divided among different parties or contracts where possible to limit single points of failure.
TRANSACTION LIFECYCLE

Comparison: Proposal vs. Finalized Transaction

Key differences between a transaction in the proposal stage and its final, on-chain state.

FeatureTransaction ProposalFinalized Transaction

State

Simulated / Pending

Confirmed / On-chain

Block Inclusion

Gas Estimation

Required for submission

Actual gas used is known

State Mutations

Simulated locally

Applied to global state

Reversibility

Can be modified or canceled

Immutable

Transaction Hash

May be predicted (e.g., EIP-155)

Definitively known

Fee Payment

Not yet paid

Paid (gas used * gas price)

Finality Guarantee

None

Varies (Probabilistic for PoW, Absolute for PoS finality)

TRANSACTION PROPOSAL

Common Misconceptions

The process of creating and submitting a transaction is often misunderstood. This section clarifies key technical distinctions and operational realities that developers and analysts frequently get wrong.

No, a transaction proposal is an unsigned, preliminary transaction object, while a signed transaction is cryptographically sealed and ready for network submission. A proposal contains the raw transaction data—such as the to address, value, data, and gasLimit—but lacks the sender's digital signature. The signature, which proves ownership of the originating account, is applied after the proposal is constructed and approved, creating the final, immutable transaction payload that nodes will validate and execute.

TRANSACTION PROPOSAL

Frequently Asked Questions (FAQ)

Common questions about the process of creating, signing, and broadcasting transactions on a blockchain network.

A transaction proposal is a structured data object that contains all the necessary information for a blockchain transaction before it is signed and broadcast. It specifies the core parameters of the intended operation, such as the sender's address, recipient, amount of value or data to transfer, and the maximum gas fee the user is willing to pay. The proposal is created by a wallet or dApp interface and is presented to the user's private key holder (often a wallet) for cryptographic approval via a digital signature. This step is crucial for user consent and security, as signing authorizes the transaction without exposing the sensitive private key.

further-reading
TRANSACTION PROPOSAL

Further Reading

A transaction proposal is the initial, unsigned form of a transaction, containing all necessary data for review and approval by required signers before execution.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline