Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Censorship Attack

A censorship attack is a deliberate action by a block producer or sequencer to exclude valid transactions from being included in a block, preventing their processing on the network.
Chainscore © 2026
definition
BLOCKCHAIN SECURITY

What is a Censorship Attack?

A censorship attack is a malicious action where a validator, miner, or a coalition of them prevents specific transactions from being included in a blockchain, thereby denying service to targeted users or applications.

In a censorship attack, a network participant with the power to propose blocks—such as a Proof-of-Stake validator or Proof-of-Work miner—intentionally excludes certain transactions from the blocks they create. This prevents those transactions from being confirmed, effectively denying a user or a decentralized application (dApp) access to the network. The attacker's goal is not to steal funds but to silence or disrupt specific activity, such as transactions from a particular wallet address, interactions with a specific smart contract, or participation in a governance vote.

The primary mechanism enabling censorship is block proposer centralization. If a single entity or a coordinated group controls a sufficient portion of the block production rights, they can filter transactions at the source. Defenses against this include credible neutrality in protocol design and decentralization of validators. Some networks implement proposer-builder separation (PBS) to separate the role of building block contents from proposing them, making censorship more difficult and costly to coordinate.

A real-world example is a miner extractable value (MEV)-related attack, where searchers pay high fees to have their transactions included. A censoring miner could ignore all transactions except those from a paying searcher, creating a pay-to-play system. On Ethereum, following regulatory sanctions, concerns arose that validators might be compelled to censor transactions linked to specific addresses, a scenario often called protocol-level censorship. This highlights the tension between decentralized network resilience and external legal pressures.

To detect censorship, networks use metrics like inclusion delay, which measures how long a transaction waits before being included in a block. High and targeted delays for specific addresses can signal an attack. Permissionless relay networks and fair ordering protocols are technical solutions being developed to ensure transaction inclusion is based on objective criteria like gas price, not an entity's discretion, thereby preserving the permissionless nature of the blockchain.

how-it-works
BLOCKCHAIN SECURITY

How a Censorship Attack Works

A censorship attack is a deliberate attempt to prevent specific transactions from being included in a blockchain's ledger, undermining its core promise of permissionless and neutral transaction processing.

A censorship attack occurs when a validator, miner, or a coalition of them selectively excludes or delays certain transactions from being added to new blocks. This is distinct from a 51% attack, which focuses on rewriting history; censorship targets the future inclusion of data. Attackers might filter transactions based on the sender's address, the recipient (e.g., a sanctioned smart contract), or transaction content. The goal is to impose external rules—like financial regulations or political mandates—onto a decentralized network, effectively creating a blacklist within the mempool.

The attack typically unfolds in two phases: transaction filtering and block production. First, the malicious actor(s) monitor the peer-to-peer network, identifying target transactions by their metadata or hashes. They then refuse to relay these transactions to other nodes, attempting to isolate them. During block production, they simply omit the censored transactions from the block template. A sustained attack requires significant hashing power (in Proof-of-Work) or stake (in Proof-of-Stake) to consistently win the right to propose blocks, making it a resource-intensive form of protocol-level censorship.

Real-world examples include nation-states potentially pressuring local miners to censor transactions from blacklisted addresses, or Maximal Extractable Value (MEV) searchers exploiting transaction ordering for profit, which can have censoring side effects. Defenses are multi-layered: decentralization of validators dilutes any single party's control, encryption or obfuscation (e.g., using mixers like Tornado Cash) hides transaction intent, and inclusion lists—a feature in protocols like Ethereum—can force validators to include specific pending transactions, creating a cryptographic proof of censorship if they refuse.

key-features
MECHANISMS AND IMPACT

Key Characteristics of Censorship Attacks

Censorship attacks are deliberate actions to prevent specific transactions from being included in a blockchain's ledger. These attacks target the core properties of permissionless systems and can manifest in several distinct ways.

01

Transaction Filtering

This is the most direct form of censorship, where a validator or miner intentionally excludes specific transactions from the blocks they produce. This can be based on the transaction's origin (e.g., a blacklisted address), its content, or its destination. Examples include:

  • A miner refusing to process transactions from a sanctioned Tornado Cash address.
  • A validator ignoring all transactions related to a specific decentralized application (dApp).
02

MEV-Based Censorship

Censorship can be enforced through Maximal Extractable Value (MEV) strategies. Searchers or block builders can create blocks that reorder or omit transactions to extract profit, which can have a censoring side effect. A prominent example is the use of Flashbots bundles, where private transaction flows allow builders to exclude public mempool transactions, potentially censoring those they deem unprofitable or undesirable.

03

Network-Level Disruption

Attackers can attempt to censor transactions before they reach block producers by attacking the peer-to-peer (P2P) network. This involves:

  • Eclipse attacks: Isolating a node from the honest network to control its view of transactions.
  • DoS attacks: Flooding a node's mempool with spam to prevent it from receiving or relaying legitimate transactions.
  • Propagation delays: Selectively delaying the gossip of certain transactions, making them stale.
04

Finality Delay & Reorgs

In Proof-of-Stake systems, a coalition of validators holding more than one-third of the staked assets can prevent the chain from finalizing blocks that contain transactions they wish to censor. This creates finality delay. A more severe attack involves a chain reorganization (reorg), where validators with a supermajority (e.g., two-thirds) can revert finalized blocks to erase previously included transactions, a form of ex-post-facto censorship.

05

Economic and Regulatory Pressure

Censorship can be enforced off-chain through legal or economic coercion. Regulatory bodies may pressure centralized staking providers, exchange validators, or infrastructure providers (like RPC endpoints) to filter transactions. This creates a central point of failure and is a primary concern for decentralization. The threat often focuses on compliance with sanctions lists, forcing node operators to choose between network rules and local laws.

06

Related Concepts

Understanding censorship requires knowledge of these related mechanisms:

  • Decentralization: The primary defense against censorship.
  • Mempool: The waiting area for pending transactions, a key attack surface.
  • Proposer-Builder Separation (PBS): A design to mitigate MEV-based censorship.
  • Censorship Resistance: A blockchain's fundamental property to resist such attacks.
  • Governance Attacks: Attacks that change protocol rules to enable censorship.
common-targets-motivations
CENSORSHIP ATTACK

Common Targets and Motivations

Censorship attacks target the fundamental property of permissionless inclusion, where a powerful entity prevents valid transactions from being processed. These attacks can be motivated by profit, regulation, or network control.

01

MEV Extraction & Front-Running

A primary motivation where block proposers (validators or miners) intentionally exclude or reorder transactions to capture Maximum Extractable Value (MEV). This includes:

  • Sandwich attacks: Censoring a victim's trade to profit from price impact.
  • Time-bandit attacks: Reorganizing blocks to steal arbitrage opportunities.
  • Transaction exclusion: Preventing a competing arbitrageur's transaction from being included.
02

Regulatory Compliance Pressure

Validators or relay operators may censor transactions to comply with jurisdictional regulations, such as sanctions lists. This is a significant concern for proof-of-stake networks where validator identity can be known. Key examples include:

  • Filtering transactions from OFAC-sanctioned addresses.
  • Pressure on centralized staking providers or infrastructure like RPC endpoints to implement blacklists.
03

Network-Level Denial-of-Service

An attacker with substantial hash power or stake can censor specific addresses or applications to disrupt service. This targets:

  • Decentralized applications (dApps): Making a specific protocol unusable.
  • Competing validators: Isolating them from the network.
  • Governance proposals: Preventing voting transactions from being included. The goal is often competitive sabotage or coercion rather than direct financial gain.
04

Transaction Mempool Filtering

Censorship can occur before a transaction reaches a block builder. Entities controlling network infrastructure can filter transactions at the mempool level.

  • Relays in Ethereum's PBS (Proposer-Builder Separation) may refuse to pass certain bundles.
  • RPC node providers can drop transactions from specific senders.
  • P2P network peers can gossip-filter transactions, creating network partitions.
05

Long-Term Consensus Attacks

The most severe form aims to permanently alter chain rules or exclude a class of participants. This includes:

  • 51% attacks: To rewrite history and erase transactions.
  • Stake grinding: Manipulating validator selection to ensure only compliant validators propose blocks.
  • Finality delays: In BFT chains, preventing the finalization of blocks containing certain transactions.
06

Countermeasures & Mitigations

Networks employ cryptographic and economic defenses against censorship.

  • Censorship resistance: A core design goal of proof-of-work and decentralized proof-of-stake.
  • Proposer-Builder Separation (PBS): Separates transaction ordering from block proposing to dilute power.
  • Encrypted mempools: Hiding transaction content until inclusion.
  • Permissionless relay networks: Ensuring multiple, neutral paths for transaction propagation.
PROTOCOL LEVEL

Comparison of Censorship-Resistance Mechanisms

A comparison of core blockchain design choices that provide resistance to transaction or block censorship.

Mechanism / FeatureProof-of-Work (PoW)Proof-of-Stake (PoS) with SlashingThreshold Cryptography (e.g., DVT)

Primary Defense

Costly computation & decentralization

Economic slashing & validator rotation

Distributed key generation & signing

Sybil Attack Resistance

Hash rate acquisition cost

Stake acquisition cost

Trusted node set or stake-based committee

Liveness Under Attack

High (any miner can produce a block)

Potentially reduced (attacker may control >33% stake)

High (if threshold of nodes is honest)

Censorship Cost for >51%

Extremely high capital/energy cost

High capital cost + risk of slashing

Requires compromising a threshold of private key shares

Validator/Proposer Selection

Probabilistic (hashing power)

Deterministic (stake-weighted or random)

Deterministic (pre-defined or elected committee)

Decentralization Requirement

Critical for security

Critical for security & liveness

Critical; trust assumption on node operators

Example Implementation

Bitcoin, Ethereum (pre-Merge)

Ethereum (post-Merge), Cosmos

SSV Network, Obol Network (for PoS validators)

security-considerations
BLOCKCHAIN SECURITY

Censorship Attack

A censorship attack occurs when a network validator or a group of validators deliberately prevents specific transactions from being included in the blockchain, undermining its neutrality and permissionless nature.

01

How It Works

An attacker with sufficient control over block production (e.g., a mining pool or validator set) filters transactions based on origin, content, or smart contract interaction. This is done by excluding them from proposed blocks or by re-ordering blocks to invalidate them. The attack targets the mempool and consensus layer.

02

Types of Censorship

  • Transaction Censorship: Blocking transactions from a specific address (e.g., a sanctioned entity).
  • Maximal Extractable Value (MEV) Censorship: Excluding transactions that compete with a validator's own arbitrage opportunities.
  • Protocol-Level Censorship: Implementing client-level rules (like OFAC compliance lists) to filter transactions before they are broadcast or proposed.
03

Key Defense: Decentralization

The primary defense is a sufficiently decentralized set of validators. If no single entity controls >33% (for liveness) or >51% (for finality) of the consensus power, coordinated censorship becomes difficult. Proof of Stake networks mitigate this through slashing for malicious behavior, while Proof of Work relies on miner distribution.

04

Technical Countermeasures

Protocols implement features to resist censorship:

  • Commit-Reveal Schemes: Hide transaction details until inclusion.
  • Threshold Encryption: Use encryption (e.g., via Shutter Network) for transaction contents until the block is finalized.
  • Proposer-Builder Separation (PBS): Separates block building from proposing to reduce a single validator's power over transaction ordering.
05

Real-World Example: OFAC Compliance

Following U.S. sanctions, some Ethereum block builders began filtering transactions interacting with Tornado Cash addresses. This created censorship pressure, measured by the percentage of OFAC-compliant blocks. The event highlighted the tension between regulatory compliance and blockchain's censorship-resistant ideals.

06

Related Concepts

  • 51% Attack: A related attack where an entity gains majority hash power to reorder or censor.
  • MEV (Maximal Extractable Value): The profit validators can extract by reordering transactions, a common motive for censorship.
  • Finality: The guarantee that transactions cannot be reversed; censorship attacks can delay but not reverse finalized transactions (in PoS).
real-world-examples
CENSORSHIP ATTACK

Real-World Examples and Scenarios

Censorship attacks are not theoretical; they have been observed in various forms across blockchain networks. These scenarios illustrate how transaction filtering can be used to manipulate network activity and user experience.

01

The OFAC Sanctions & Tornado Cash

Following U.S. sanctions on the Tornado Cash smart contracts, a significant portion of Ethereum validators, including major staking services, began censoring transactions that interacted with the blacklisted addresses. This created a two-tiered mempool, where sanctioned transactions were excluded from blocks proposed by compliant validators, effectively delaying or preventing their execution. This is a prime example of regulatory-driven censorship at the consensus layer.

~45%
Peak Censoring Validators
02

Miner Extractable Value (MEV) & Frontrunning

While not censorship in the traditional sense, MEV searchers and block builders can engage in transaction ordering attacks. By controlling block construction, they can:

  • Exclude certain transactions entirely to manipulate prices or liquidations.
  • Front-run user trades by inserting their own transactions first.
  • Sandwich attack a victim's transaction. This selective inclusion/exclusion based on profitability is a form of economic censorship.
03

Network-Level Denial-of-Service (DoS)

An attacker can attempt to flood the network's mempool with high-fee, meaningless transactions. This creates congestion that makes it economically or technically difficult for legitimate, lower-fee transactions to be included in blocks. While not a targeted filter, the effect is the censorship of ordinary users who cannot outbid the spam. This highlights the importance of block space markets and fee mechanisms as anti-censorship tools.

04

The 51% Attack & Transaction Reversion

A 51% attack is the ultimate censorship vector. An entity controlling a majority of a Proof-of-Work network's hash rate can:

  • Orphan blocks containing specific transactions, removing them from the canonical chain.
  • Prevent new transactions from being confirmed by refusing to include them. This demonstrates that consensus security is the foundational defense against the most severe forms of censorship.
05

Proposer-Builder Separation (PBS) as a Mitigation

Ethereum's move to Proposer-Builder Separation (PBS) via MEV-Boost was designed, in part, to combat censorship. It creates a competitive market for block building, making it harder for a single entity to control transaction inclusion. A validator (proposer) chooses from blocks built by many builders. If one builder censors, the proposer can select an uncensored block from another, preserving credible neutrality.

06

Force-Inclusion Mechanisms & crLists

Advanced protocols are developing technical countermeasures. crLists (censorship resistance lists) are a proposed Ethereum upgrade where validators can be forced to include transactions from a public mempool. If a builder tries to censor, the proposer can attach a crList, mandating the inclusion of those pending transactions in the next block. This uses cryptographic proofs to enforce inclusion guarantees.

DEBUNKED

Common Misconceptions About Censorship Attacks

Censorship attacks are a critical security consideration in blockchain design, but several persistent myths can lead to flawed risk assessments. This section clarifies the technical realities behind common misunderstandings.

A censorship attack is a malicious action where a validator, miner, or a coalition of them intentionally prevents specific transactions from being included in new blocks, thereby denying service to a user or application. This works by the attacker using their control over block production to filter the mempool and exclude transactions based on criteria like sender address, smart contract interaction, or transaction content. The attack is successful if the targeted transactions remain in a perpetual pending state, unable to achieve finality. It is distinct from a 51% attack, which involves rewriting history, as censorship focuses on blocking future state updates.

CENSORSHIP ATTACK

Frequently Asked Questions (FAQ)

Censorship attacks threaten the core promise of permissionless blockchains. This FAQ addresses the mechanisms, risks, and defenses against transaction and block-level censorship.

A censorship attack is a deliberate attempt by a network participant, typically a validator or miner, to prevent specific transactions from being included in the blockchain, thereby denying service to certain users. This violates the permissionless and neutral nature of the network. The attacker uses their control over block production to filter out transactions based on criteria like sender address, smart contract interaction, or transaction content. While not altering the ledger's history, it disrupts the liveness guarantee, preventing users from transacting.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team