Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Inherent

An inherent is a special type of extrinsic in Substrate that contains non-consensus, validated data (like a timestamp) which is agreed upon by block authors.
Chainscore © 2026
definition
BLOCKCHAIN CONSENSUS

What is an Inherent?

An inherent is a special type of transaction that is not signed by an external user but is instead created and inserted directly into a block by the block author, based on information that is inherently known to the network.

In the context of blockchain consensus, an inherent is a piece of data, such as a timestamp or a validator reward, that is considered self-evident and valid based on the network's own state and the passage of time. Unlike standard signed transactions, inherents are not gossiped across the peer-to-peer network. Instead, they are created by the block producer—be it a miner in Proof-of-Work or a validator in Proof-of-Stake—during block construction. This process is governed by a set of hard-coded rules within the node's runtime, which defines what constitutes valid inherent data for a given block height.

The primary function of inherents is to enable the blockchain to record objective truths that all honest nodes can independently verify without relying on external input. Common examples include the block timestamp, which is derived from the validator's system clock and validated against a consensus-driven window of acceptability, and slot numbers in slot-based consensus mechanisms. In the Polkadot and Substrate ecosystem, the InherentData struct is a core abstraction that bundles these unsigned, agreed-upon data points, which are then processed by specific inherent extrinsics within a block.

From a security perspective, inherents present a unique challenge. Because they are unsigned, they cannot be validated using cryptographic signatures. Instead, their validity is enforced through consensus rules and runtime logic. All network participants must run the same inherent validation code. If a block author includes an invalid inherent—like a timestamp far in the future—other nodes will reject the entire block during their verification process. This makes the system reliant on the economic incentives of honest block production to maintain integrity.

Understanding inherents is crucial for grasping how blockchains achieve state transition without centralized input. They are a foundational mechanism for integrating real-world information flow—like time—into a deterministic system. While simple in concept, their correct implementation is vital for network liveness, accurate reward distribution, and the execution of automated, time-based logic within smart contracts and parachain protocols.

how-it-works
BLOCKCHAIN CONSENSUS

How Inherents Work

Inherents are a core mechanism in blockchain consensus protocols, representing data that is intrinsic to a block's creation but not derived from external transactions.

In the context of blockchain consensus, an inherent is a piece of data that is considered valid based on its intrinsic properties and the block author's privileged position, rather than being verified through a cryptographic proof like a signature. Unlike standard transactions, inherents are not gossiped across the peer-to-peer network and are not stored in the transaction pool. Instead, they are created directly by the block author—such as a validator or block producer—and inserted into a block based on the author's inherent knowledge of the system's state and the passage of time. This makes them "inherent" to the block's creation moment.

The primary function of inherents is to embed time-sensitive or system-critical information that all honest validators can independently agree upon. Common examples include a timestamp, which asserts the block's creation time, or a randomness seed for future operations, derived from a verifiable random function (VRF). In Proof-of-Stake systems like those built with Substrate, inherents are also used to report equivocation (double-signing) offenses or to finalize the list of validators for the next era. The validity of an inherent is checked by all network nodes using a specific check_inherent function, which verifies the data against the node's own view of the blockchain's rules and state.

The process is governed by a specific runtime API. When constructing a block, the block author calls the inherent_extrinsics function to gather all necessary inherent data. Other nodes then execute the check_inherent function during block import to validate this data. Because inherents rely on a shared understanding of time and system rules, they require a loosely synchronized clock among nodes. Malicious block authors cannot arbitrarily invent valid inherents, as the data must pass the network's collective validation check, ensuring the mechanism maintains the chain's security and consensus without introducing a central point of trust.

key-features
BLOCKCHAIN CONSENSUS

Key Features of Inherents

Inherents are special types of data or operations that are considered valid by a blockchain's consensus rules without requiring external proof, such as a signature. They are integral to the block production process itself.

01

Unsigned Transactions

An inherent is an unsigned transaction that is not submitted by an external user but is instead created and validated by the block author (e.g., a validator or collator). Its validity is derived from the block's context and the network's consensus rules, not from cryptographic signatures.

  • Key Property: No signature verification is required.
  • Example: A timestamp inherent is valid if the timestamp is plausible (e.g., not in the future and after the previous block).
02

Block Production Primitives

Inherents provide the fundamental data necessary to construct a valid block. They represent information that is inherent to the block's position in the chain and the state of the network at that moment.

Common types include:

  • Timestamps: The current time for the block.
  • Randomness: A seed for on-chain randomness (e.g., for parachain auctions).
  • Parachain Inclusion: Notifications of new parachain blocks in Polkadot/Kusama.
03

Consensus-Based Validation

The validity of an inherent is determined solely by the node's execution of the runtime's check_inherent function. This function checks the data against the blockchain's current state and predefined rules.

  • Process: The block author proposes inherents; other nodes re-execute check_inherent to verify them.
  • Outcome: If the check fails, the entire block is considered invalid. This mechanism ensures all nodes agree on the intrinsic properties of each block.
04

Distinct from Extrinsics

It is critical to distinguish inherents from extrinsics. Extrinsics are external transactions (signed or unsigned) that originate from users and are included in a block. Their validity depends on origin and signature checks.

  • Inherent: Unsigned, author-created, validity from consensus context.
  • Extrinsic: Can be signed or unsigned, user-originated, validity from origin/signature rules. This separation is a core design pattern in frameworks like Substrate.
05

Implementation in Substrate

In the Substrate blockchain framework, inherents are implemented through a dedicated pallet and runtime API. The inherent module defines the data structures and the check_inherent logic.

  • Pallet Interface: The InherentData struct is populated by the block author.
  • Runtime API: The BlockBuilder API includes methods like check_inherents and apply_extrinsic to process them during block construction.
06

Use Case: On-Chain Timestamps

The timestamp inherent is a canonical example. Each block must contain a timestamp that is roughly synchronized with real-world time for functions like staking rewards, slashing, and scheduled calls.

  • Mechanism: The validator proposes a timestamp. Other nodes verify it is within an acceptable window (e.g., within 10 minutes of their system time and greater than the previous block's time).
  • Importance: Provides a reliable, decentralized time source for smart contracts and pallets without relying on oracles.
common-examples
BLOCKCHAIN CONTEXT

Common Examples of Inherent Data

Inherent data is information that is intrinsic to the creation of a block, not derived from user transactions. It is proposed by block producers and must be agreed upon by network validators.

01

Timestamp

The Unix timestamp proposed by the block author, representing the moment of block creation. It is a fundamental piece of inherent data used to order events and enforce time-dependent logic, such as unlocking staked funds or executing scheduled smart contracts. Validators must agree the timestamp is plausible (not far in the future/past).

02

Block Number

A strictly incrementing integer that uniquely identifies a block's position in the canonical chain. This inherent data is critical for consensus, as it establishes an immutable ordering. It is used in proofs, smart contract logic (e.g., time-locks based on block height), and to calculate epochs or eras in proof-of-stake systems.

03

Parachain Validation Data (Polkadot)

In the Polkadot and Kusama networks, parachains submit inherent data to the Relay Chain to prove their state transitions are valid. This includes:

  • A proof-of-validity for the parachain block.
  • Upward messages from the parachain to the Relay Chain.
  • The horizontal message queue for cross-parachain communication (XCMP).
04

Randomness Beacon (VRF Output)

A cryptographically verifiable random value generated in one block and made available as inherent data in subsequent blocks. Used by protocols like Ouroboros Praos (Cardano) and BABE (Polkadot) for leader election and slot assignment. This provides unbiased, unpredictable randomness for consensus and applications.

05

Validator Set Changes

In proof-of-stake networks, the list of active validators for the next era is often included as inherent data. This allows the network to seamlessly rotate validator duties based on stake and performance, ensuring liveness and security. The change is agreed upon via consensus, not a user transaction.

06

On-Chain Governance Results

The outcome of a concluded governance referendum or vote can be enacted as inherent data. For example, in Substrate-based chains, the Democracy pallet finalizes votes and schedules the execution of approved proposals (like parameter changes or runtime upgrades) by writing the result into the block as inherent extrinsic data.

EXTRINSIC TYPES

Inherent vs. Signed/Unsigned Extrinsic

A comparison of the three primary types of transactions (extrinsics) in Substrate-based blockchains, focusing on their origin, validation, and inclusion in a block.

FeatureInherent ExtrinsicSigned ExtrinsicUnsigned Extrinsic

Origin / Author

Block Author (Validator)

External Account (Private Key)

External Entity (No Signature)

Signature

Pays Transaction Fees

Context-dependent

Inclusion Prerequisite

Block Author Privilege

Valid Signature & Fees

Custom Pallet Logic

Primary Use Case

Time Stamps, Randomness, Consensus

User-Initiated Transfers & Smart Contracts

Off-Chain Worker Submissions, Staking Payouts

On-Chain Identity

None (System Origin)

SS58 Address

None or Pallet-Specific

Example

timestamp.set()

balances.transfer()

imOnline.heartbeat()

security-model
BLOCKCHAIN FUNDAMENTALS

Security and Trust Model

The security and trust model defines the foundational principles and cryptographic mechanisms that ensure the integrity, immutability, and reliability of a blockchain network without relying on a central authority.

A blockchain's security and trust model is the formal framework that establishes how participants in a decentralized network achieve consensus on a single version of the truth. This model replaces the need for a trusted intermediary by using cryptographic proofs and economic incentives to secure the network against attacks like double-spending or data tampering. Core components include the consensus mechanism (e.g., Proof of Work, Proof of Stake), cryptographic hashing, digital signatures, and the network's sybil resistance and fault tolerance properties. The strength of this model directly determines the network's resilience and the level of trust users can place in its ledger.

The trust model shifts from trusting a central entity to trusting the underlying mathematics, code, and game-theoretic incentives. In Proof of Work (PoW), trust is placed in the immense computational energy required to rewrite history, making attacks economically irrational. In Proof of Stake (PoS), trust is placed in validators' financial stake, which can be slashed for malicious behavior. This creates a system where it is more profitable to follow the rules than to attack them. The model also defines the network's adversarial assumptions, such as the percentage of malicious nodes it can tolerate while remaining secure, often formalized as the 1/3 or 1/2 Byzantine Fault Tolerance (BFT) threshold.

Security is not static but a continuous property enforced by the network's participants. Cryptographic primitives like SHA-256 hashing create an immutable chain where altering any block would require recalculating all subsequent hashes. Digital signatures (e.g., ECDSA) authenticate every transaction. The model must also account for long-range attacks, nothing-at-stake problems, and eclipse attacks, designing specific countermeasures within the protocol. For example, checkpointing in PoW or slashing and warm-up/cooldown periods in PoS are direct responses to identified attack vectors within the trust model.

Evaluating a blockchain's security model involves analyzing its cryptoeconomic security budget. For PoW chains, this is the total hashrate; for PoS chains, it's the total value staked. A higher security budget makes a 51% attack more costly. The model also dictates finality—the point at which a transaction is irreversible. Probabilistic finality, used in chains like Bitcoin, means confidence increases with each new block. Absolute finality, used in many BFT-based chains like those using Tendermint, means instant, irreversible confirmation once a block is finalized by the validator set.

Ultimately, a robust security and trust model is what allows decentralized applications, digital assets, and smart contracts to function reliably. It is the bedrock upon which decentralized trust is built, enabling parties who do not know each other to transact and compute with confidence. As blockchain technology evolves, so do these models, with hybrid approaches and novel consensus algorithms like Proof of History or Nakamoto Consensus with Proof of Stake continually pushing the boundaries of scalability and security.

ecosystem-usage
INHERENT

Ecosystem Usage

In blockchain, 'inherent' describes data or properties that are intrinsic to the protocol's consensus rules, not derived from user transactions. These are fundamental, system-level attributes.

01

Consensus & Block Production

Inherent data is embedded directly into a block by the block author (e.g., a validator) based on the protocol's inherent logic. Examples include:

  • Block timestamp (based on the validator's clock and network rules).
  • Slot number in Proof-of-Stake chains (determined by the protocol's schedule).
  • Parachain-specific data in Polkadot (like aggregated offline reports). This data is not signed by users and is validated as part of the block's intrinsic validity.
02

Extrinsics vs. Inherents

A core distinction in Substrate-based chains (e.g., Polkadot, Kusama).

  • Extrinsics: User-originated, signed operations (transfers, smart contract calls). They represent outside influence.
  • Inherents: Unsigned, validator-provided data representing inside information the protocol agrees is true (like elapsed time). The block author bundles inherents into a block before including any extrinsics.
03

Runtime Logic & Validation

The blockchain's runtime (state transition function) contains specific logic, often in an impl InherentData block, to:

  1. Create inherent data for a new block.
  2. Validate inherent data in a received block against the chain's current state and rules. This ensures all nodes agree on the system's inherent properties without requiring transaction fees or signatures.
04

Common Examples

Beyond timestamps, inherents are used for critical, non-transactional data feeds:

  • Randomness: A verifiable random function (VRF) output for the block, used in consensus or lotteries.
  • Validator Set Changes: In some consensus models, the list of active validators for the next era.
  • Off-Chain Worker Data: Results from off-chain computations reported back on-chain by the block author.
05

Security Implications

Because inherents are unsigned, their security relies on consensus and economic incentives. Validators are slashed for submitting invalid inherents (e.g., a false timestamp). The protocol's design must ensure inherents are objective and falsifiable—nodes must be able to independently verify their correctness based solely on the previous state and the protocol rules.

INHERENT

Frequently Asked Questions

Inherents are a core concept in blockchain consensus, representing data that is intrinsic to a block and not derived from user transactions. This section answers common questions about their role, creation, and importance.

An inherent is a piece of data that is intrinsic and self-evident to a block, validated by the block author (e.g., a validator or miner) without requiring a signed transaction from an external user. Unlike regular transactions, inherents are not gossiped across the peer-to-peer network and are instead injected directly into a block during its construction. They represent information that is inherently true for that specific block slot, such as a timestamp or a validator-secured random number. Their validity is determined by the block validation rules of the consensus protocol itself, not by transaction semantics.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
What is an Inherent? | Substrate Blockchain Glossary | ChainScore Glossary