Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Transaction Censorship

Transaction censorship is the deliberate prevention of a valid transaction from being included in a block, or its strategic reordering, by a block producer.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is Transaction Censorship?

A critical mechanism where network validators can selectively exclude or reorder transactions, raising concerns about neutrality and decentralization.

Transaction censorship is the act of a blockchain validator, miner, or sequencer deliberately preventing a specific transaction from being included in a block or delaying its confirmation, despite it being valid and paying the required fee. This action directly contradicts the principle of permissionless access and can be executed by entities controlling significant network hash power or stake. Censorship is distinct from a transaction failure; the transaction is valid but is being actively filtered out by a powerful network participant.

The primary mechanisms for censorship involve block proposers who can simply omit transactions from their proposed blocks or use techniques like Maximum Extractable Value (MEV) to reorder transactions for profit, which can have a censoring side-effect. On networks like Ethereum, following The Merge, validators can also implement proposer-builder separation (PBS), where specialized builders may censor transactions before a block is proposed. Regulatory pressure, such as sanctions compliance, is a common real-world driver, leading to the creation of censorship-resistant relay networks and the implementation of inclusion lists to counteract it.

Censorship resistance is a foundational property of decentralized networks. Protocols enhance it through mechanisms like proof-of-work (where censorship requires >51% hash power), distributed validator technology (DVT), and cryptographic techniques such as encrypted mempools. The ongoing development of credible neutrality standards aims to ensure blockchains remain open and resistant to both governmental and corporate control, making the study of censorship vectors essential for protocol design and health assessment.

key-features
MECHANISMS AND IMPLICATIONS

Key Characteristics of Transaction Censorship

Transaction censorship occurs when network validators or intermediaries selectively exclude, delay, or reorder transactions based on their content, sender, or recipient, rather than standard fee-based priority.

01

Validator-Level Exclusion

The most direct form of censorship where a validator or miner intentionally omits a valid transaction from the block they propose. This can be done by filtering transactions from a specific address, containing certain data, or interacting with a blacklisted smart contract. It represents a failure of the network's permissionless and neutral properties.

02

Mempool Isolation

A subtler form of censorship where a validator or a group of nodes refuses to relay or gossip specific transactions within the peer-to-peer network. This prevents the transaction from entering the mempool of other honest validators, effectively hiding it from the broader network and limiting its chance of inclusion.

03

Transaction Ordering (MEV)

Censorship via Maximal Extractable Value (MEV) strategies, where a validator reorders transactions within a block to their advantage or to the disadvantage of a specific user. While often profit-driven, this can be used to front-run, sandwich, or delay a target's transaction, altering its outcome.

04

Regulatory Compliance Drivers

Censorship often stems from external pressure, such as OFAC sanctions compliance. Validators operating in regulated jurisdictions may be compelled to filter transactions involving sanctioned addresses. This creates network-level risks if a supermajority of validators adopt the same filtering rules.

05

Proposer-Builder Separation (PBS)

A design pattern, central to Ethereum's roadmap, that mitigates censorship by separating the roles of block builder and block proposer. Builders create content-rich blocks, and proposers simply choose the most profitable. This allows for censorship-resistant lists where builders can commit to including all valid transactions.

06

Cryptoeconomic Resistance

Networks resist censorship through economic incentives. Proof-of-Stake slashing, credibly neutral protocols, and mechanisms like Ethereum's inclusion lists penalize or work around censoring validators. The ultimate defense is a decentralized, geographically distributed validator set with diverse jurisdictions.

how-it-works
MECHANISM

How Transaction Censorship Works

Transaction censorship is the selective exclusion of valid transactions from being included in a blockchain's ledger, typically by the network's block producers.

At its core, transaction censorship occurs when a validator, miner, or sequencer—an entity with the power to propose new blocks—intentionally omits a specific, otherwise valid transaction from the block they are constructing. This is distinct from a transaction being rejected due to invalid signatures or insufficient gas; a censored transaction is technically correct but politically or economically undesirable to the block producer. Common motivations include compliance with government sanctions, competitive exclusion (e.g., a decentralized exchange front-running a user), or ideological opposition to a transaction's origin or purpose.

The primary technical vector for censorship is block space control. In Proof-of-Work and Proof-of-Stake networks, the entity that wins the right to produce the next block has unilateral, albeit temporary, authority over its contents. They can simply choose not to include a transaction they see in the mempool. More sophisticated attacks involve network-level censorship, where a validator refuses to relay or propagate certain transactions to peers, preventing them from reaching other block producers. On rollups, the sequencer has even more centralized power to order or exclude transactions before they are posted to the base layer like Ethereum.

Blockchain communities combat censorship through decentralization and protocol-level designs. A highly decentralized set of validators makes collusion to censor difficult. Commitment schemes like enshrined rollups or threshold encryption can hide transaction details until after inclusion. The most robust defense is credible neutrality, where protocol rules are indifferent to a transaction's content. Ultimately, persistent, large-scale censorship is considered an active attack on the network, potentially triggering community-led responses like changing the consensus mechanism or executing a user-activated soft fork (UASF) to bypass malicious actors.

primary-motivations
TRANSACTION CENSORSHIP

Primary Motivations for Censorship

Censorship in blockchain networks is not arbitrary; it is driven by specific, often conflicting, incentives and mandates that influence which transactions are included or excluded from a block.

02

Maximal Extractable Value (MEV)

Validators and searchers engage in transaction ordering to capture value, which can manifest as censorship. A common tactic is time-bandit attacks, where a validator reorgs the chain to exclude a profitable transaction they missed. More directly, validators may censor arbitrage or liquidation transactions to capture that value themselves in a subsequent block, denying the original sender their intended execution.

03

Network Stability & Spam Prevention

Validators may temporarily censor transactions to protect network health. This includes filtering:

  • Spam transactions that bloat the chain or cause congestion.
  • Malicious smart contract calls that could destabilize the network.
  • Transactions with exceptionally low fees during peak demand to prioritize economic throughput. While often framed as a public good, this discretionary power can be abused to suppress legitimate activity.
04

Political or Ideological Motives

Validators or dominant mining pools may impose censorship based on the content or perceived purpose of a transaction. This could target:

  • Transactions funding specific political causes or organizations.
  • Interactions with applications (e.g., gambling, privacy tools) deemed undesirable.
  • Activity from certain geographic regions. This represents a direct form of content-based censorship, conflicting with the credo of permissionless innovation.
05

Economic Coercion (Protocol-Level)

Some blockchain protocols have built-in slashing conditions or penalties that can force validators to censor. For example, a protocol might punish validators for including transactions that violate certain rules encoded at the consensus layer. This creates a form of programmatic censorship where the network's own economic incentives are designed to exclude specific transaction types, often for security reasons.

06

Anti-Competitive Behavior

Dominant entities in the blockchain stack (e.g., large validator pools, RPC providers, or frontends) may censor transactions to harm competitors. This could involve blocking access to competing decentralized applications (dApps) or protocols. Such censorship creates centralization risks, as a few powerful actors can shape the economic landscape by controlling transaction flow, undermining the network's credible neutrality.

ecosystem-usage-examples
CASE STUDIES & SOLUTIONS

Real-World Instances & Protocol-Level Responses

Transaction censorship is not a theoretical threat. This section examines documented incidents where validators or miners have filtered transactions and the technical countermeasures developed by protocols to resist such control.

03

Censorship-Resistant Ordering (CRLs)

Censorship-Resistant Ordering mechanisms, such as Commit-Reveal Schemes and Threshold Encryption, are cryptographic techniques that prevent block producers from viewing or discriminating against transaction content before inclusion. A Commit-Reveal List (CRL) allows users to submit a commitment (hash) of their transaction first. Only after the commitment is included in a block is the full transaction revealed and executed, blinding validators to the transaction's details during the critical selection phase.

04

Inclusion Lists

An Inclusion List is a protocol-enforced mechanism that allows a block proposer to mandate the inclusion of specific, otherwise-censored transactions in the next block. If a builder attempts to exclude transactions from the list, the proposer can reject the entire block. This shifts power back to the decentralized set of proposers, creating a credible threat that makes censorship attempts futile. Inclusion lists are a key anti-censorship feature planned for Ethereum.

05

The 51% Attack & Chain Reorgs

A malicious majority of miners or validators (a 51% attack) can enact the most severe form of censorship: transaction deletion via chain reorganizations (reorgs). By secretly mining an alternative chain, the attackers can produce a longer chain that excludes specific transactions entirely, effectively rewriting history. This is a fundamental but expensive attack vector in both Proof-of-Work and Proof-of-Stake systems, defended against by the high economic cost of acquiring majority hash power or stake.

security-considerations
TRANSACTION CENSORSHIP

Security Implications & Risks

Transaction censorship occurs when network validators or miners intentionally exclude specific transactions from being included in blocks, undermining the permissionless and neutral nature of a blockchain.

01

Definition & Core Mechanism

Transaction censorship is the act where a block producer (e.g., a miner or validator) refuses to include a valid transaction in a block they are proposing, despite the transaction paying the required fee. This is distinct from a network-wide outage; the network functions, but specific transactions are filtered out. The primary mechanism is control over block space—the entity building the next block has unilateral discretion over its content.

02

Primary Attack Vectors

Censorship typically manifests through two main vectors:

  • Technical Filtering: Validators run modified node software (e.g., MEV-Boost relays with block lists) to screen transactions based on origin (e.g., from a sanctioned Tornado Cash address) or content.
  • Economic Pressure: Dominant mining pools or validator sets, often under regulatory duress, agree to collectively exclude certain transactions. This can approach 51% attack levels if a majority colludes, making censorship persistent.
03

Real-World Examples

Historical instances provide concrete examples of censorship risks:

  • OFAC Sanctions Compliance: Following U.S. sanctions, major Ethereum MEV-Boost relays began filtering transactions involving sanctioned Tornado Cash addresses, leading to a measurable percentage of blocks being built compliantly.
  • Miner Extractable Value (MEV): Searchers often bribe validators via PGA (Priority Gas Auctions) to censor competing transactions, reordering or excluding them to capture arbitrage value.
04

Mitigation & Anti-Censorship Tech

Protocols and users employ several techniques to resist censorship:

  • Decentralized Block Building: Solutions like SUAVE aim to separate block building from proposal, reducing single-entity control.
  • Censorship Resistance Metrics: Monitoring tools track the censorship resistance of validators by measuring inclusion of test transactions from blacklisted addresses.
  • Commit-Reveal Schemes: Users can submit encrypted transactions that are only revealed after inclusion, hiding their content from censoring validators.
05

Related Concept: Finality & Liveness

Censorship directly impacts two core blockchain security properties defined by the CAP theorem and Byzantine Fault Tolerance (BFT) models:

  • Liveness: The guarantee that all valid transactions will eventually be included. Censorship is a liveness failure.
  • Finality: The guarantee that included transactions cannot be reverted. Some consensus mechanisms (e.g., Tendermint) can theoretically finalize a censored block, making the attack more severe than in probabilistic finality chains.
06

Economic & Governance Implications

Censorship shifts blockchain from a credibly neutral platform to a permissioned one, with significant downstream effects:

  • Validator Centralization Risk: Regulatory pressure can force centralization among compliant operators, creating a single point of failure.
  • Smart Contract Risk: DeFi protocols and bridges relying on timely transaction inclusion may fail if their operations are censored.
  • Governance Attacks: Censorship can be used as a tool in governance attacks to silence token holders or prevent execution of unwanted proposals.
FAQ

Common Misconceptions About Transaction Censorship

Clarifying widespread misunderstandings about how transactions are processed, validated, and potentially excluded on public blockchains.

Transaction censorship is the act of a network validator (e.g., a miner or staker) intentionally excluding or reordering valid transactions from being included in a block, often due to external pressure or protocol-level rules. It works at the block production layer: a validator with the right to propose a block can simply omit specific transactions from their block template. This is distinct from invalidating a transaction, as the censored transaction remains valid and can be included by a subsequent, non-censoring validator. Censorship resistance is a core property of decentralized networks, measured by the cost and coordination required for a validator set to successfully filter transactions over time.

mitigation-techniques
TRANSACTION CENSORSHIP

Technical Mitigations & Solutions

To combat transaction censorship, blockchain ecosystems have developed a suite of technical solutions designed to bypass centralized control points and preserve permissionless access.

01

Miner Extractable Value (MEV) Auctions

A mechanism that formalizes the competition for transaction ordering by allowing users to bid for block space directly with block builders. This creates a market that can circumvent a censorious validator by routing transactions through alternative, competitive channels.

  • Key Concept: Proposer-Builder Separation (PBS) decouples block building from block proposing.
  • Example: A user submits a transaction with a high priority fee to a private mempool or a builder network, making it economically irrational for a validator to ignore it.
03

Commit-Reveal Schemes

A cryptographic technique that hides the content of a transaction until after it is included in a block, preventing censorship based on its data. The transaction is submitted in two phases.

  • Commit Phase: A user publishes a hash of their transaction data (the commitment).
  • Reveal Phase: After the commitment is included in a block, the user reveals the original data, which is then executed.
  • Use Case: Effective for censored actions like voting in decentralized governance or participating in certain DeFi mechanisms.
04

Peer-to-Peer (P2P) Network Hardening

Improving the resilience of the underlying network layer to make it harder for any single entity to filter transactions. This involves diversifying the nodes and connections that propagate transaction data.

  • Dandelion++: A network protocol that anonymizes the origin of a transaction by routing it through a random path (the stem) before broadcasting it widely (the fluff phase).
  • Network Incentives: Encouraging a robust, globally distributed set of full nodes and relays to prevent network-level choke points.
05

Enshrined Proposer-Builder Separation (PBS)

A protocol-level upgrade that bakes the separation of block building and proposing directly into the blockchain's consensus rules. This is considered the most robust long-term mitigation against validator-level censorship.

  • Core Idea: The protocol itself manages the auction between builders (who create full blocks) and proposers (who simply select the highest-paying block).
  • Benefit: It prevents a single validator from easily identifying and censoring specific transactions, as the proposer only sees complete block bids, not individual transactions.
  • Status: A planned future upgrade for networks like Ethereum.
06

Threshold Encryption

A method where transactions are encrypted before being sent to the network and can only be decrypted by a decentralized committee of validators after the block is proposed. This completely hides transaction content from individual validators and builders.

  • Process: A user encrypts a transaction with a public key. A threshold of validators (e.g., 2/3) must collaborate to decrypt it after inclusion.
  • Guarantee: No single entity can read the transaction to censor it, but the decentralized group can ensure it's valid before finalizing the block.
  • Example: Proposed as a core component of encrypted mempools for maximal censorship resistance.
TRANSACTION CENSORSHIP

Frequently Asked Questions (FAQ)

Common questions about how transactions can be excluded from a blockchain and the technical mechanisms to prevent it.

Transaction censorship occurs when a network validator or miner intentionally excludes a valid transaction from being included in a block, preventing its confirmation on the blockchain. This is a deviation from the protocol's neutral rules, where the highest fee transactions are typically prioritized. Censorship can be protocol-level, where a rule change blacklists certain addresses, or implementation-level, where individual validators filter transactions based on their origin or content. It represents a failure of credible neutrality and can be used for regulatory compliance or malicious attacks like denial-of-service (DoS) against specific users or applications.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
Transaction Censorship: Definition & Blockchain Security | ChainScore Glossary