Forced inclusion is a blockchain protocol mechanism that guarantees users can submit transactions directly to a data availability (DA) layer, bypassing and overriding any potential censorship by a centralized sequencer or block producer. This is a critical property for rollups and other modular blockchain architectures that rely on an external party to order and post transaction data. The core function is to enforce the data availability of a transaction, ensuring it is recorded on-chain and can be processed, even if the primary operator attempts to ignore or censor it.
Forced Inclusion
What is Forced Inclusion?
A mechanism ensuring transaction data is published to a data availability layer, preventing censorship by sequencers or block producers.
The mechanism typically works by allowing users to submit a transaction with a proof of prior submission to the sequencer. If the sequencer fails to include the transaction within a predefined time window or challenge period, the user can force its inclusion by submitting it directly to the underlying Layer 1 (L1) blockchain, such as Ethereum. The L1 smart contract verifies the proof of censorship and then processes the transaction itself, often penalizing the malicious sequencer. This creates a credible threat that disincentivizes censorship in the first place.
Forced inclusion is a foundational component for achieving censorship resistance in systems with centralized transaction ordering. It is explicitly implemented in protocols like Arbitrum through its Delayed Inbox and in Optimism via its deposit feed. Without forced inclusion, a malicious sequencer could selectively exclude transactions—a significant security and liveness failure. The mechanism ensures that the system's liveness ultimately depends on the decentralized and secure base layer, not the honesty of a single intermediary.
Implementing forced inclusion involves careful design trade-offs. The challenge period introduces a delay for censored transactions, creating a tension between user experience and security. Furthermore, the cost of forcing inclusion via an L1 transaction is typically higher, which must be economically accounted for. Despite these trade-offs, forced inclusion is considered a non-negotiable feature for credible, decentralized rollups, as it upholds the core blockchain principle of permissionless participation and auditability.
How Does Forced Inclusion Work?
A technical explanation of the forced inclusion mechanism, which ensures critical transactions are processed even during network congestion.
Forced inclusion is a blockchain mechanism that guarantees a specific transaction will be included in a future block, regardless of network congestion or fee market conditions, by leveraging a special transaction type with a time-locked execution. This is achieved by submitting a transaction with a dataGas parameter (in Ethereum) or a similar construct, which creates a binding commitment for block builders to include it before a specified deadline, typically within a 1-2 block window. The mechanism is a core component of data availability solutions and blob-carrying transactions, ensuring that critical data like fraud proofs or state commitments are not censored.
The process begins when a user submits a forced inclusion transaction, paying a base fee and setting a maxFeePerDataGas. This transaction enters a mempool but is not immediately eligible for inclusion. After a short delay (e.g., one block), it becomes includable. Validators or block builders are then cryptoeconomically compelled to include it in the next block, as failure to do so allows anyone to submit a proof of exclusion, resulting in the validator being slashed or penalized. This creates a strong anti-censorship guarantee, as it becomes more expensive to censor the transaction than to include it.
A primary use case is within optimistic rollups and validiums. These Layer 2 systems post transaction data or state commitments to Layer 1. If a sequencer becomes malicious and withholds data, a user can force the inclusion of the necessary data to initiate a fraud proof or facilitate withdrawals. This makes forced inclusion a fundamental safety net for users, ensuring the liveness and security of scaling solutions are not dependent on the goodwill of a single operator.
The implementation details vary by protocol. On Ethereum, forced inclusion is facilitated through EIP-4844's blob transactions and the associated data gas market. Other chains may implement similar logic through smart contract functions or consensus-level rules. The key invariant is the creation of a cryptoeconomic promise: a transaction with a verifiable timestamp after which the network consensus rules mandate its processing, transforming a potential liveness failure into a simple economic cost.
Key Features & Properties
Forced inclusion is a blockchain protocol mechanism that guarantees a transaction will be included in a future block, even if it is initially censored by block producers. It is a critical component of credible neutrality and censorship resistance.
Core Mechanism
Forced inclusion allows a user to submit a transaction with a high-enough priority fee to a mempool. If a block builder ignores it, the user can submit a proof of censorship (e.g., a signed transaction bundle) to a subsequent, honest builder who is cryptoeconomically obligated to include it, often receiving a slashing penalty if they refuse.
Purpose & Guarantee
Its primary purpose is to provide a cryptoeconomic guarantee against transaction censorship. This ensures that permissionless access to the blockchain is maintained, preventing block producers from selectively excluding transactions based on content, origin, or low fees, which is vital for DeFi, auctions, and governance.
Implementation Examples
- Ethereum (via Proposer-Builder Separation): Builders commit to including censorship-resistant lists or face slashing.
- Flashbots SUAVE: Aims to enforce inclusion guarantees across chains.
- Optimistic Rollups: Often implement forced inclusion to ensure L1 users can exit to L1 even if the sequencer is malicious.
Cryptoeconomic Enforcement
Enforcement relies on staking and slashing. Block builders or proposers must post a bond (stake). If they are proven to have censored a transaction eligible for forced inclusion, their bond is slashed, making censorship economically irrational. This aligns incentives with network neutrality.
Relation to MEV
Forced inclusion interacts directly with Maximal Extractable Value (MEV). It prevents censorship MEV, where a block builder excludes certain transactions to manipulate arbitrage or liquidations for their own gain. It ensures fair ordering guarantees can be built on top of the base layer.
Limitations & Challenges
- Timing Guarantees: It guarantees inclusion, but not when; delays can still be harmful.
- Implementation Complexity: Requires robust proof systems and consensus on what constitutes a valid proof of censorship.
- Data Availability: The transaction data must remain publicly available in the mempool to be provable.
Protocols Implementing Forced Inclusion
Forced inclusion is a blockchain mechanism that ensures specific transactions are included in a block, typically implemented to guarantee censorship resistance for critical operations. The following protocols have pioneered or integrated distinct approaches to this concept.
Arbitrum (via Sequencer Inclusion)
Arbitrum's sequencer provides a soft guarantee of transaction inclusion with a forced inclusion fallback. Users can submit transactions directly to the sequencer for fast, ordered inclusion. If the sequencer is unresponsive or censoring, users can force their transaction into the Arbitrum Inbox on Layer 1 after a delay.
- Forced Inclusion Path: Transactions are submitted as delayed inbox messages on Ethereum L1, which the sequencer must process within a challenge period (~1 week).
- Key Feature: This creates a strong censorship resistance guarantee while optimizing for the common case of a honest sequencer.
Optimism (via L1 Queue)
The Optimism protocol (OP Mainnet) implements forced inclusion through its canonical transaction chain. If the Sequencer is malicious or offline, users can submit transactions directly to a queue on the Ethereum L1 contract. The sequencer is required to include transactions from this queue in the order received, enforced by the protocol's fraud proof or fault proof system.
- Enforcement: The verifier nodes can challenge a sequencer that ignores the L1 queue, making censorship economically irrational.
- Design Goal: Ensures liveness and permissionlessness as foundational properties of the rollup.
Fuel Network (via UTXO Model)
Fuel, an optimistic rollup, implements forced inclusion via its parallelized UTXO model. Transactions specify their exact inputs (coins). A block producer cannot exclude a valid transaction that spends specific UTXOs without invalidating the chain's state, as those UTXOs become unspendable. This creates a form of cryptographic forced inclusion.
- Core Mechanism: Relies on stateful validity proofs where transaction validity is independent of order.
- Advantage: Provides strong censorship resistance and enables parallel transaction execution.
Bitcoin (via RBF & CPFP)
While Bitcoin lacks a protocol-level forced inclusion rule, users have two fee-based market mechanisms to compel inclusion: Replace-By-Fee (RBF) and Child-Pays-For-Parent (CPFP).
- RBF: Allows a sender to replace a stuck, low-fee transaction with a new one paying a higher fee, incentivizing miner inclusion.
- CPFP: Allows a receiver of an unconfirmed transaction output to spend it in a new, high-fee transaction, forcing miners to include both to collect the fee.
- Nature: These are economic incentives, not cryptographic guarantees, making them weaker than protocol-enforced methods.
Starknet (via L1 → L2 Messages)
Starknet ensures message inclusion from Ethereum L1 to the Starknet L2 via a forced transaction mechanism. Messages sent to Starknet's L1 messaging contract must be included and processed by the sequencer in the next L2 block. The system's state transition integrity, backed by STARK validity proofs, guarantees that the sequencer cannot ignore these L1 messages without creating an invalid state root.
- Guarantee: Provides strong liveness for cross-chain communication (L1→L2).
- Foundation: Relies on the verifier contract on L1 rejecting state updates that omit mandatory messages.
Forced Inclusion vs. Alternative Censorship Solutions
A comparison of the primary mechanism for resisting transaction censorship with other common approaches.
| Feature / Mechanism | Forced Inclusion (e.g., via MEV-Boost) | Permissioned List (Whitelist) | Proposer-Builder Separation (PBS) |
|---|---|---|---|
Core Principle | Builders must include all valid transactions from a public mempool. | Validators only accept transactions from a pre-approved list of senders. | Decouples block building from proposing to isolate censoring actors. |
Censorship Resistance | |||
Decentralization | High - relies on open, permissionless mempool. | Low - centralizes power with list controller. | Medium - depends on builder market structure. |
Implementation Complexity | Protocol-level change (e.g., crList). | Simple client configuration rule. | Requires a sophisticated external marketplace. |
Primary Use Case | Guaranteeing transaction inclusion in L1 protocols. | Enterprise or regulatory compliance. | Ethereum's post-Merge roadmap to mitigate centralization. |
User Experience Impact | Transparent; users see guaranteed inclusion. | Opaque; transactions from non-listed users fail. | Transparent; users interact with builders, not proposers. |
Key Risk | Potential for spam or resource exhaustion attacks. | Creates a centralized point of failure and control. | Builder centralization could reintroduce censorship. |
Example / Status | Implemented via crLists in some L2s, proposed for Ethereum. | Common in private/permissioned chains. | Implemented via MEV-Boost (incomplete PBS). |
Security Considerations & Limitations
Forced inclusion is a mechanism that allows transactions to bypass a mempool and be included directly in a block, presenting unique security trade-offs.
Censorship Resistance
Forced inclusion is a primary tool for censorship resistance. It allows users to submit transactions directly to block builders via a side channel (like a private RPC), guaranteeing they will be included in the next block, even if all public mempools are censoring them. This is critical for time-sensitive operations like liquidations or governance votes.
- Mechanism: Relies on block builder compliance with protocol rules.
- Limitation: Requires a willing, honest builder; a fully malicious builder coalition could still ignore the transaction.
MEV Extraction Risk
Transactions submitted via forced inclusion are highly vulnerable to Maximal Extractable Value (MEV) extraction. Because they must be included, searchers and builders can precisely front-run or sandwich them with high predictability.
- Example: A forced-inclusion DEX swap reveals its intent, allowing a searcher to place orders before and after it to profit from the price impact.
- Mitigation: Users must accept potentially worse execution prices as the cost for guaranteed inclusion.
Builder Centralization Pressure
The security of forced inclusion depends on the existence of at least one honest builder. This creates centralization pressure, as users will gravitate towards a few large, reputable builders they trust to honor inclusion commitments.
- Risk: If a single builder dominates the market, it becomes a central point of failure and potential censorship.
- Protocol Design: Systems like Ethereum's PBS (Proposer-Builder Separation) attempt to separate block building from proposing to mitigate this risk.
Implementation & DoS Vectors
Implementing forced inclusion requires careful protocol design to prevent Denial-of-Service (DoS) attacks. Malicious users could spam the inclusion channel with low-fee or invalid transactions.
- Common Safeguards:
- Bonding/Slashing: Requiring a stake or bond that is slashed for invalid submissions.
- Rate Limiting: Capping the number or size of forced transactions per block.
- Fee Minimums: Enforcing a base fee to make spam costly.
Relayer Trust Assumptions
Forced inclusion often relies on a relayer network (e.g., Flashbots Protect, Taichi Network) to receive and forward transactions to builders. This introduces new trust assumptions.
- User Risks: The relayer could censor, delay, or leak transaction information.
- Privacy: While bypassing public mempools, transactions are still visible to the relayer and the builder, creating a smaller trust set than fully private solutions like zk-SNARKs.
Protocol-Level Guarantees
The ultimate strength of forced inclusion is defined by protocol-level enforcement. In Ethereum, this is envisioned through inclusion lists (e.g., EIP-7547), where block proposers must include specified transactions, making censorship a slashable offense.
- Weak Guarantee: Current builder-level inclusion relies on social consensus and reputation.
- Strong Guarantee: Protocol-level lists move the guarantee from the builder market to the consensus layer, significantly enhancing security.
Common Misconceptions About Forced Inclusion
Forced inclusion is a critical but often misunderstood mechanism in blockchain transaction processing. This section debunks prevalent myths and clarifies its precise technical function and limitations.
Forced inclusion is a blockchain protocol mechanism that guarantees a specific transaction will be included in the next block, provided it pays a sufficiently high priority fee, overriding a block builder's ability to censor it. It works by allowing a transaction's sender to attach a priority fee (e.g., a tip) that is high enough to make it economically irrational for a block builder to exclude it, as doing so would mean forfeiting that fee revenue. This mechanism is enforced at the protocol level, not through social consensus. For example, in Ethereum, a transaction with a very high maxPriorityFeePerGas has a high probability of forced inclusion, as validators are economically incentivized to prioritize fee revenue.
Technical Deep Dive
Forced inclusion is a critical mechanism in blockchain transaction processing, ensuring data availability and censorship resistance. This section explores its technical implementation, use cases, and impact on network security.
Forced inclusion is a protocol-level mechanism that guarantees a transaction will be included in a future block, even if the current block's proposer attempts to censor it. It works by allowing users to submit transactions with a higher base fee than the current block, which subsequent block builders are economically incentivized to include to capture the excess fee. This creates a credible threat against censorship, as excluding the transaction only delays its execution while forfeiting revenue to a competitor.
- Core Function: Enforces data availability and censorship resistance.
- Key Mechanism: Uses fee premiums to create mandatory inclusion in a subsequent block.
- Primary Context: Most prominently implemented in Ethereum's fee market post-EIP-1559.
Frequently Asked Questions (FAQ)
Forced inclusion is a critical mechanism in blockchain transaction processing, particularly relevant to rollups and mempool dynamics. These questions address its core function, implementation, and impact on users and developers.
Forced inclusion is a protocol-level guarantee that ensures a valid transaction submitted to a specific queue or mempool will be included in a block within a defined time or block height, preventing indefinite censorship or delay. It works by assigning transactions a higher priority or a hard deadline; if a sequencer, validator, or block producer fails to include the transaction by that deadline, the protocol allows the transaction to be submitted directly through an alternative, more expensive, but guaranteed pathway (like an L1 inbox contract). This mechanism is a foundational component of ensured liveness and censorship resistance in systems like optimistic rollups and certain L1 blockchains.
Key components:
- Inclusion Deadline: A specific future block number after which the force-inclusion pathway opens.
- Fallback Pathway: A permissionless, often more costly, method to post the transaction directly to a settlement layer.
- Sequencer Accountability: Forces the primary block producer (e.g., a rollup sequencer) to behave honestly or be bypassed.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.