Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Inclusion List

An inclusion list is a mechanism in modular blockchain architectures that allows a block proposer to mandate the inclusion of specific transactions in a block, countering censorship by block builders.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is an Inclusion List?

An inclusion list is a permissioned whitelist of pre-validated transactions that a block builder must include in a block, designed to prevent censorship and enhance transaction fairness.

An inclusion list is a cryptographically signed list of pending transactions that a validator or block proposer mandates a block builder to include in the next block. This mechanism is a core component of proposer-builder separation (PBS) architectures, acting as a countermeasure against censorship by ensuring that certain transactions cannot be arbitrarily excluded. The proposer, who holds the right to propose the next block, creates the list from the mempool and passes it to the builder, who must incorporate these transactions or forfeit the block-building opportunity.

The primary technical goal is to enforce transaction inclusion guarantees. Without an inclusion list, a block builder could censor transactions based on origin, content, or gas price. By requiring specific transactions to be included, the system protects against Maximal Extractable Value (MEV) exploitation tactics like time-bandit attacks and ensures a base level of fair ordering. Protocols like Ethereum implement this through mechanisms such as the proposer-builder separation (PBS) with crLists (censorship resistance lists), where validators can force the inclusion of transactions that have been pending for too long.

Implementing an inclusion list involves a delicate balance. It must be privacy-preserving to prevent builders from front-running the listed transactions, often achieved through commitments or encryption until the block is revealed. Furthermore, it must respect the builder's autonomy over block construction for economic efficiency. The list typically specifies which transactions must be included but not where in the block, allowing builders to optimize ordering around them for fee maximization and MEV extraction, provided they do not invalidate the mandated transactions.

From a network health perspective, inclusion lists are a critical anti-censorship tool. They ensure that transactions from sanctioned addresses or competing MEV searchers cannot be systematically filtered out by dominant block-building entities. This promotes decentralization and credible neutrality at the protocol level. Their design is a direct response to the centralizing pressures of professionalized block building, making the blockchain more resilient against both malicious and profit-driven exclusion of valid transactions.

The evolution of inclusion lists is closely tied to Ethereum's roadmap. Post-The Merge, with the separation of consensus and execution layers, inclusion lists like those proposed in EIP-7547 provide a standardized way for consensus-layer validators to exert influence over execution-layer block content. This represents a shift from pure first-price auction models to a hybrid system that enforces social and protocol-level guarantees without completely sacrificing the efficiency gains of specialized block builders.

how-it-works
BLOCKCHAIN MECHANISM

How an Inclusion List Works

An inclusion list is a permissioned mechanism within a blockchain's transaction ordering process, designed to ensure specific transactions are included in the next block.

An inclusion list is a cryptographically signed list of pending transactions that a block proposer is required to include in the next block they produce. This mechanism, also known as a transaction inclusion list or block inclusion list, is a core component of proposer-builder separation (PBS) architectures like those in Ethereum. It acts as a countermeasure against censorship by preventing validators from arbitrarily excluding transactions, such as those from decentralized exchanges or privacy tools, from the mempool. The list is typically submitted by searchers or users to the current block proposer, who must incorporate it to remain compliant with the network's consensus rules.

The operational flow begins when a user or a specialized network participant, often called a committer, creates a list of transaction hashes they want guaranteed inclusion. This list is signed and transmitted to the block proposer for the upcoming slot. In systems like Ethereum, this is facilitated by a dedicated inclusion list endpoint on the validator client. The proposer is then obligated to add these transactions to the block's execution payload, provided they are valid (e.g., have sufficient gas and correct nonces). Failure to include a valid list can result in the proposer being slashed or penalized, enforcing protocol-level anti-censorship guarantees.

Inclusion lists directly address the maximal extractable value (MEV) concern of censorship. Without them, a block builder could ignore transactions that reduce their potential MEV profits. By mandating inclusion, the protocol ensures a base level of transaction liveness and fairness. This is particularly vital for time-sensitive DeFi arbitrage trades or liquidations, where delayed inclusion could lead to significant financial loss. The design represents a shift from a purely free-market model of block space allocation to one with enforceable social commitments embedded in the consensus layer.

Implementing an inclusion list requires careful protocol design to balance efficiency and security. Key challenges include determining the maximum list size (to prevent denial-of-service attacks), handling transactions that become invalid between list submission and block execution, and defining clear slashing conditions. Proposals like EIP-7547 for Ethereum formalize these specifications. The list does not dictate the order of transactions—only their inclusion—leaving the block builder free to optimize ordering for MEV capture around these mandatory items, thus preserving some economic efficiency for validators.

The long-term evolution of inclusion lists may see them integrated with other anti-censorship tools like crLists (censorship-resistant lists) or encrypted mempools. As a foundational credible neutrality tool, they ensure the base layer cannot be easily coerced into filtering specific transaction types. For developers, understanding inclusion lists is crucial for building applications that require reliable transaction settlement, as it defines the minimum guarantee their users have against being silently censored by the network's validators.

key-features
MECHANISM

Key Features of Inclusion Lists

Inclusion Lists are a proactive security mechanism that defines which transactions a validator or block builder is permitted to include in a block, acting as a whitelist for MEV and transaction flow.

01

Proactive Transaction Filtering

Unlike a censor list (denylist) that blocks specific transactions, an inclusion list is a whitelist that proactively specifies the only transactions a validator must include from the mempool. This flips the security model, ensuring censorship resistance by forcing validators to include user transactions that meet the list's criteria, preventing them from being ignored for more profitable MEV bundles.

02

Enforced by Consensus

The rules of the inclusion list are enforced at the consensus layer. Validators must attest to and build blocks that comply with the list. Proposing a block that fails to include specified transactions can result in a slashing penalty or the block being considered invalid. This cryptographic enforcement is what distinguishes it from social or off-chain commitments.

03

Counter-MEV and Fair Sequencing

A primary use is to prevent Maximal Extractable Value (MEV) exploitation like frontrunning and sandwich attacks. By guaranteeing that certain user transactions (e.g., DEX swaps) are included in the next block and in a specific order, inclusion lists enable fair sequencing. Projects like Flashbots SUAVE aim to use this concept to create a neutral, decentralized block building market.

04

Builder-Validator Separation

Inclusion lists operate within the proposer-builder separation (PBS) framework. The block builder creates a full block with transactions and MEV. The block proposer (validator) then checks this block against the required inclusion list. If it's non-compliant, the proposer may be required to create a simpler, compliant block using the list, ensuring user transactions are not excluded for builder profit.

05

Comparison to Censor Lists

  • Inclusion List (Whitelist): "You MUST include these transactions." Pro-active, guarantees inclusion.
  • Censor List (Denylist): "You MUST NOT include these transactions." Re-active, can still lead to censorship by omission. Inclusion lists provide a stronger guarantee for liveness (transactions will be processed), while censor lists only address safety (preventing bad transactions).
06

Implementation Example: Ethereum EIP-7266

Ethereum's proposed EIP-7266 (Inclusion Lists) is a concrete specification. It allows validators to signal a list of transaction hashes from the mempool that must be included. If a builder's block does not contain them, the validator can propose a fallback block containing just those transactions, disincentivizing builders from ignoring them. This is a key part of Ethereum's post-PBS anti-censorship roadmap.

primary-motivations
WHY THEY EXIST

Primary Motivations for Inclusion Lists

Inclusion Lists are not just a technical feature; they are a strategic response to fundamental challenges in decentralized block building. Their adoption is driven by several core motivations that address security, fairness, and economic efficiency.

01

Mitigating MEV Extraction & Censorship

A primary driver is to combat Maximal Extractable Value (MEV) exploitation and transaction censorship by centralized block builders. By pre-defining a set of transactions that must be included, the list prevents builders from excluding certain transactions for profit or to comply with external sanctions. This ensures fair access to block space and protects users from predatory MEV strategies like frontrunning and sandwich attacks.

02

Enhancing Protocol Security & Predictability

Inclusion Lists provide a cryptoeconomic security guarantee for applications. Protocols like cross-chain bridges or lending markets can specify that critical transactions (e.g., oracle updates, liquidation calls) are included in the next block. This eliminates the risk of liveness failures where a malicious or faulty builder ignores time-sensitive operations, thereby making the entire application layer more robust and predictable.

03

Decentralizing Block Production Power

They act as a counterbalance to the centralization of block building. In a proposer-builder separation (PBS) model, builders hold significant power. An inclusion list allows the block proposer (validator) to reclaim a portion of this power by mandating specific content. This re-distributes influence, moving the network closer to the ideal of credible neutrality where no single entity controls transaction ordering.

04

Optimizing for Application-Specific Needs

Different applications have unique requirements for block space. An inclusion list allows dApps and rollups to express their needs programmatically. For example:

  • A gaming dApp can ensure its state updates are included for a smooth UX.
  • An L2 rollup can guarantee its batch submission or proof submission transaction is included, securing its bridge and finalizing user withdrawals.
05

Improving Economic Efficiency for Proposers

While often framed as a security tool, inclusion lists also have an economic rationale. They allow proposers to capture value from non-MEV transactions. A proposer can include transactions that are valuable to an application (e.g., a high-fee arbitrage opportunity for a DeFi protocol) and potentially be compensated for providing this liveness assurance, creating a new fee market outside of standard builder bids.

technical-implementation
BLOCK PROPOSER MECHANISM

Inclusion List

A protocol-level mechanism that grants block proposers the exclusive right to include specific transactions or blocks from other chains, designed to enhance censorship resistance and economic fairness.

An inclusion list is a cryptoeconomic mechanism, most notably implemented in Ethereum's proposer-builder separation (PBS) framework, that grants a block proposer (or validator) the exclusive right to force the inclusion of certain transactions into the next block. This right is enforced at the protocol level, acting as a counterbalance to potential censorship by block builders who assemble block contents. By mandating that transactions on the list must be included if they are valid and pay sufficient fees, the system creates a credible threat that disincentivizes builders from filtering out transactions for non-economic reasons, thereby strengthening network neutrality.

The operational flow involves two key roles: the block proposer, who is randomly selected to sign off on a block, and the block builder, who constructs the block's contents for maximum profit. In a system with an inclusion list, the proposer can submit a list of pending transactions to the builder. The builder must then include all transactions from that list which are still valid and have met a minimum bid, or else forfeit the block. This creates a commitment device, ensuring that even if a builder wishes to censor certain transactions, the economic incentive to win the block auction will compel compliance with the proposer's list.

This mechanism addresses critical issues in modern blockchain design. Primarily, it mitigates censorship resistance risks by preventing builders from systematically excluding transactions based on origin or content. Secondly, it improves proposer economics; in pure PBS, proposers merely sell block space and capture minimal value, but with inclusion lists, they can extract more value by selling guaranteed inclusion, making the validator role more sustainable. The design is a direct response to concerns about centralized mev-boost relays potentially engaging in transaction filtering.

Implementation specifics can vary, with proposals like MEV-Boost++ exploring different models. A common approach is a pre-confirmation system, where users can pay the proposer directly for a slot on the list, receiving a cryptographic guarantee their transaction will be in the next block. Alternative designs may allow proposers to specify a tail gas reservation in the block header, which builders must fill with the highest-fee transactions from a public mempool, ensuring fee market efficiency isn't compromised.

The development of inclusion lists represents a significant evolution in blockchain governance, shifting from pure fee-market dynamics to a structured rights-based allocation of block space. It exemplifies how protocol design can embed economic and social values—like censorship resistance and fair access—directly into the consensus layer, creating robust incentives that align the interests of builders, proposers, and end-users without requiring off-protocol coordination or trust.

ecosystem-usage
INCLUSION LIST

Ecosystem Usage & Examples

Inclusion lists are a security mechanism used by block validators to specify which transactions or smart contracts are permitted to execute. This section details their practical applications and implementations across different blockchain ecosystems.

06

Layer 2 Sequencing with Priority Inclusion

Layer 2 rollups (Optimistic & ZK) often have a centralized sequencer that batches transactions. These systems can implement inclusion lists to provide priority lanes or guaranteed inclusion for certain users or applications, often for a fee. This ensures time-sensitive transactions (e.g., arbitrage) are processed in the next L2 block before being submitted to L1.

< 1 sec
L2 Block Time
MECHANISM COMPARISON

Inclusion List vs. Related Concepts

A comparison of the Inclusion List, a specific MEV mitigation tool, with other related blockchain concepts that govern transaction ordering and access.

Feature / PurposeInclusion ListMempoolBlock BuilderValidator

Primary Function

Guarantees transaction inclusion in the next block

Holds pending, unconfirmed transactions

Constructs full block contents for a proposer

Proposes and attests to new blocks

Control Over Ordering

Guarantees inclusion only, not position

No control; unordered pool

Full control over transaction order

Delegates to builder or uses local mempool

MEV Mitigation Role

Core mechanism to prevent censorship

Source of MEV opportunities

Can extract and capture MEV

Can outsource to mitigate regulatory/technical risk

Who Manages It

Protocol or consensus layer (e.g., Ethereum protocol)

Network nodes (each has its own)

Specialized searchers or builders

Validator node operator

Transaction Guarantee

Yes, for list-submitted transactions

No guarantee of inclusion

No guarantee for non-builder transactions

Final authority on block acceptance

Architectural Layer

Consensus Layer

Execution Layer / Network

Execution Layer (external service)

Consensus Layer

Key Interaction

Proposer must include list or skip block

Source of transactions for builders & validators

Sends complete block to proposer

Selects builder's block or builds locally

Example/Implementation

Ethereum's PBS with Inclusion Lists

Ethereum public mempool, Flashbots private RPC

Flashbots Builder, bloXroute Builder

Ethereum validator client (e.g., Prysm, Lighthouse)

security-considerations
INCLUSION LIST

Security & Economic Considerations

An Inclusion List is a permissioned whitelist of pre-validated transactions that a block builder must include in a block, acting as a critical mechanism for censorship resistance and MEV protection.

01

Core Mechanism & Purpose

An Inclusion List is a cryptographic commitment, typically provided by a consensus-level entity like a relay or validator, that specifies transactions which must be included in the next block if they are valid and have paid sufficient fees. Its primary purpose is to enforce censorship resistance by preventing builders from arbitrarily excluding certain transactions (e.g., those from a sanctioned protocol). This creates a credible neutrality guarantee for the base layer.

02

Architectural Role in PBS

In Proposer-Builder Separation (PBS), the block proposer (validator) outsources block construction to specialized builders. The Inclusion List is the proposer's tool to retain sovereignty. It acts as a backstop: if a builder's block does not include all eligible transactions from the list, the proposer can reject the block or the protocol can enforce a slashing condition. This ensures builders cannot censor transactions for profit or other motives.

03

Economic & MEV Implications

Inclusion Lists directly interact with Maximal Extractable Value (MEV) economics.

  • Builder Constraint: They limit a builder's ability to reorder or omit transactions for optimal MEV extraction, potentially reducing their profit margin.
  • Proposer Insurance: They guarantee that high-fee, time-sensitive transactions (e.g., arbitrage, liquidations) from the list are included, protecting the proposer's revenue.
  • Market Dynamics: They can shift value from the builder market back to validators, influencing staking yields and the overall MEV supply chain.
04

Implementation Variants

Different designs balance security, complexity, and efficiency:

  • Soft Inclusion Lists: The proposer provides a list, but builders are not strictly forced to comply; enforcement is social or reputational.
  • Hard/Enforced Lists: Protocol-level rules (e.g., in the consensus client) mandate inclusion, with slashing for non-compliance.
  • Encrypted Mempool Lists: Transactions are encrypted until block revelation, combining inclusion guarantees with MEV resistance. Examples include research like Temporal Inclusion Lists.
05

Security Trade-offs & Risks

While enhancing censorship resistance, Inclusion Lists introduce new attack vectors and trade-offs:

  • Performance Overhead: Validating and enforcing lists adds computational load, potentially impacting block propagation times.
  • List Manipulation: A malicious actor could flood the list with low-fee or invalid transactions to degrade block quality (Denial-of-Service).
  • Centralization Pressure: Reliable list creation may require sophisticated infrastructure, favoring large staking pools or professional validators.
06

Related Concepts

Censorship Resistance: The core property an Inclusion List defends. Proposer-Builder Separation (PBS): The architectural context where lists are most relevant. MEV-Boost: A prevalent PBS implementation in Ethereum where inclusion list functionality is actively debated. Block Builder: The entity whose freedom is constrained by the list. Relay: A trusted intermediary that often facilitates list distribution between proposers and builders.

DEBUNKING MYTHS

Common Misconceptions About Inclusion Lists

Inclusion Lists are a critical security primitive in blockchain design, but their purpose and mechanics are often misunderstood. This section clarifies the most frequent points of confusion.

An Inclusion List is a cryptographically signed list of transactions that a validator or block builder is required to include in the next block they produce, if those transactions are valid and have paid sufficient gas. It works by allowing a trusted entity, like a sequencer in a rollup or a proposer in a shared sequencer network, to issue a signed message specifying transaction hashes or calldata. The block producer must then prioritize these transactions, ensuring they are not censored. This mechanism is a key component for enforcing preconfirmations and guaranteeing transaction ordering in systems like Ethereum's PBS (Proposer-Builder Separation) ecosystem.

INCLUSION LISTS

Frequently Asked Questions (FAQ)

Inclusion Lists are a critical mechanism for transaction ordering and censorship resistance in modern blockchains. These FAQs address their core function, implementation, and impact on network security and user experience.

An Inclusion List is a cryptographically signed list of pending transactions that a block builder is required to include in the next block they produce. It is a key component of proposer-builder separation (PBS) architectures, designed to prevent censorship by ensuring that specific transactions cannot be excluded from the blockchain. The list is typically submitted by the current block proposer (or validator) to a builder or relay, mandating the inclusion of certain transactions at the top of the block, thereby guaranteeing their execution and finality.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Inclusion List: Definition & Role in Blockchain | ChainScore Glossary