Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Permissionless Relay

A permissionless relay is a cryptographically verifiable component in the MEV supply chain that anyone can operate, requiring no trusted relationship with block proposers or builders.
Chainscore © 2026
definition
BLOCKCHAIN INFRASTRUCTURE

What is a Permissionless Relay?

A permissionless relay is a decentralized network node that forwards transactions or data blocks without requiring prior authorization, enabling open participation in blockchain ecosystems.

A permissionless relay is a network infrastructure component that accepts and forwards transactions or data blocks to a blockchain or layer-2 network without requiring the submitter to have explicit, pre-approved access. This is a core tenet of decentralized and censorship-resistant systems, contrasting sharply with permissioned relays operated by a closed consortium. In practice, anyone can run a relay node, and any user can submit data through it, provided they pay the necessary network fees. This model underpins the open-access philosophy of networks like Ethereum, where validators and sequencers often rely on a permissionless relay network for transaction propagation.

The primary technical function of a permissionless relay is to serve as a public gateway for transaction inclusion. It receives transactions from users, performs basic validation (like checking signatures and nonces), and broadcasts them to the broader peer-to-peer network. A key architectural pattern is the relayer model used in cross-chain communication, such as with IBC (Inter-Blockchain Communication) or certain bridge designs. Here, independent, permissionless relayers monitor one chain for events (like a token lock) and submit corresponding proof transactions to a destination chain, earning fees for their service without being whitelisted by a central authority.

Operating a permissionless relay involves both incentives and considerations. Relay operators typically earn fees from the transactions they process, creating a competitive, open market for block space. However, they must correctly implement protocol rules and maintain robust connections to avoid being bypassed by users and other nodes. Notable examples include the Flashbots SUAVE network, which aims to create a permissionless market for block building, and the relay networks that service Ethereum's proposer-builder separation (PBS) architecture, where builders submit blocks to proposers via a decentralized relay.

how-it-works
MECHANISM

How Does a Permissionless Relay Work?

A permissionless relay is a decentralized network component that forwards transactions to a blockchain without requiring prior approval from a central authority.

A permissionless relay operates as a public, open-access service that accepts transaction bundles from users or builders and submits them to a target blockchain's mempool. Its core function is to act as a neutral communication layer, ensuring that transactions can be broadcast to the network by anyone, from anywhere, without censorship. This is a foundational principle for decentralization and credible neutrality, as it prevents any single entity from controlling which transactions are seen by the network's validators or sequencers.

The relay's architecture typically involves a set of geographically distributed servers running specialized software. When a user submits a transaction, the relay performs basic validation checks—such as verifying the transaction's format and signature—to protect the network from spam. Crucially, it does not perform subjective filtering based on content or sender. Once validated, the relay efficiently propagates the transaction to a broad set of network nodes, increasing its chances of being included in the next block. This process is often facilitated by a peer-to-peer (P2P) gossip protocol.

In practice, permissionless relays are essential for MEV (Maximal Extractable Value) strategies and builder markets, as seen in Ethereum's PBS (Proposer-Builder Separation) ecosystem. Builders compete to create the most profitable blocks and rely on relays to receive transaction bundles from searchers. A truly permissionless relay does not exclude builders or manipulate the order of bundles it receives, ensuring a fair and competitive auction for block space. This contrasts with permissioned relays, which maintain an allowlist of approved participants.

The security model of a permissionless relay is based on cryptographic proofs and cryptoeconomic incentives. While it does not decide transaction validity (that's the blockchain's role), it must be resilient to DDoS attacks and maintain high uptime. Some implementations use staking or bonding mechanisms to penalize malicious relay operators. The reliability and neutrality of these relays are critical for the health of the underlying blockchain, as they form a key part of the infrastructure for transaction inclusion.

key-features
ARCHITECTURAL PRINCIPLES

Key Features of Permissionless Relays

Permissionless relays are infrastructure components that enable secure, decentralized communication between blockchains. Their core features ensure censorship resistance, economic security, and open participation.

01

Censorship Resistance

A permissionless relay operates without a central gatekeeper, meaning any user or application can submit a cross-chain message without requiring approval. This is enforced by cryptographic proofs (like Merkle proofs) that any network participant can verify, ensuring the relay cannot arbitrarily block or censor transactions. This is a fundamental departure from permissioned, multi-sig bridges which have centralized points of control.

02

Economic Security & Cryptoeconomics

Security is derived from the underlying blockchain's consensus and a system of cryptoeconomic incentives. Key mechanisms include:

  • Bonding/Staking: Relayers or provers must stake (bond) native tokens, which can be slashed for malicious behavior.
  • Fraud Proofs: Observers can challenge invalid state transitions, with slashed funds rewarding the challenger.
  • Cost of Attack: The security budget is tied to the total value staked, making attacks economically irrational.
03

Decentralized Verification

Instead of trusting a committee, message validity is proven via light client verification or zero-knowledge proofs (zk-SNARKs/STARKs). A light client on the destination chain cryptographically verifies block headers and Merkle proofs from the source chain. This allows the destination chain to autonomously verify the origin and integrity of incoming messages, removing trusted intermediaries.

04

Open Relay Network

The relay network itself is permissionless. Anyone can run a relayer node to listen for events, generate proofs, and submit transactions, earning fees for service. This creates a competitive, decentralized marketplace for relay services, improving liveness and redundancy. Examples include the p2p networks of relayers in protocols like Axelar and the open prover sets in zkBridge designs.

05

Universal Interoperability

Designed to connect a wide array of blockchains, not just EVM-compatible ones. A permissionless relay uses general-purpose message passing and agnostic verification to facilitate communication between heterogeneous chains (e.g., Cosmos, Solana, Bitcoin). This is achieved through abstracted adapter contracts and chain-agnostic proof formats like ICS (Interchain Standards).

06

Trust Minimization

The ultimate goal is to reduce trust assumptions to the security of the connected blockchains themselves. This is achieved through a combination of:

  • On-chain verification of cryptographic proofs.
  • Economic penalties for provers.
  • Decentralized watchtowers for fraud detection. This creates a security model where users do not need to trust the relay operators, only the mathematical guarantees of the protocol.
ARCHITECTURAL FOUNDATIONS

Permissioned vs. Permissionless Relay Comparison

A technical comparison of the core operational and security models for blockchain transaction relay mechanisms.

Feature / MetricPermissioned RelayPermissionless Relay

Access Control

Whitelisted, centralized operator(s)

Open, any node can participate

Censorship Resistance

Trust Assumption

Trust in the relay operator(s)

Trust in economic incentives and protocol rules

Operator Revenue Model

Fixed fee or private agreement

Competitive open market (e.g., MEV auctions)

Block Builder Integration

Direct, often exclusive integration

Decentralized builder marketplace (e.g., mev-boost)

Typical Latency

< 100 ms

100-500 ms (varies with p2p network)

Primary Use Case

Private consortia, enterprise chains

Public mainnets (e.g., Ethereum, Polygon)

Implementation Example

Besu, Hyperledger Fabric

Flashbots SUAVE, bloXroute

motivation-censorship-resistance
CORE PRINCIPLES

Motivation: Censorship Resistance and Decentralization

This section explores the foundational motivations behind permissionless blockchain infrastructure, focusing on the principles of censorship resistance and decentralization that underpin the design of systems like the permissionless relay.

A permissionless relay is a network component that accepts and forwards blockchain transactions or blocks without requiring prior authorization from a central authority, thereby serving as a critical infrastructure for censorship resistance. In a centralized model, a single entity can arbitrarily filter or reject transactions based on content, origin, or other criteria. A permissionless relay, by design, has no such gatekeeping capability; it must process valid transactions submitted by any participant. This architectural choice ensures that no single point of control can prevent a user from interacting with the network, which is a fundamental property of decentralized systems like Ethereum.

The operational model of a permissionless relay is intrinsically linked to decentralization. By allowing anyone to run a relay node, the system distributes trust and operational responsibility across a broad, geographically dispersed set of operators. This eliminates reliance on a single, potentially corruptible or vulnerable service provider. Key mechanisms that enable this include cryptographic verification of transaction validity and incentive alignment through protocols like MEV-Boost, where relays compete to provide the best service to block builders and validators. The absence of a whitelist for users or operators is the defining feature that separates a permissionless relay from its permissioned counterpart.

The practical necessity for censorship-resistant, decentralized relays became starkly apparent following events like the OFAC sanctions compliance for Ethereum transactions in 2022. When dominant, centralized relay operators began censoring transactions to comply with regulatory demands, they threatened the network's neutrality. This highlighted a centralization risk at the infrastructure layer. The response was a push for greater adoption of diverse, independent, permissionless relays, ensuring that the network's state reflects the consensus of its validators, not the compliance policies of a few intermediary services. This maintains the blockchain's property as a credibly neutral base layer.

technical-requirements
PERMISSIONLESS RELAY

Technical Requirements & Implementation

A permissionless relay is a decentralized network infrastructure that allows any user to submit transactions to a blockchain without requiring approval from a central operator. Its implementation relies on specific technical components to ensure security, liveness, and economic viability.

01

Network Architecture

A permissionless relay operates as a peer-to-peer (P2P) network of independent relay nodes. These nodes listen for transaction bundles from users or builders, propagate them, and submit them to the target blockchain. The architecture must be fault-tolerant and resistant to censorship, with no single point of failure or control. Key components include:

  • Node Client Software: Open-source software that any participant can run.
  • Gossip Protocol: For propagating transaction data across the network.
  • Blockchain RPC Endpoints: Connections to one or more execution and consensus layer clients.
02

Economic Model & Incentives

To ensure liveness and honest participation, a permissionless relay requires a robust cryptoeconomic model. This typically involves:

  • Staking/Slashing: Relay operators may be required to post a bond (stake) that can be slashed for malicious behavior (e.g., censorship, withholding blocks).
  • Fee Mechanism: Operators earn fees (e.g., a percentage of priority fees or MEV) for successfully relaying blocks, aligning their incentive with network utility.
  • Cost Recovery: The model must cover operational costs like gas fees for submission and infrastructure overhead.
03

Censorship Resistance

The core technical guarantee of a permissionless relay is credible neutrality. Implementation focuses on making transaction censorship technically difficult and economically costly. Mechanisms include:

  • First-Come-First-Served (FCFS) Ordering: Processing transactions in the order they are received.
  • Commit-Reveal Schemes: Hiding transaction content until it's too late to censor.
  • Redundancy: Multiple independent nodes ensure if one refuses a valid transaction, another can include it.
  • Transparent Logs: Publicly verifiable logs of all received transactions to prove censorship attempts.
04

Integration with Builders & Proposers

The relay acts as a trust-minimized communication layer between block builders and block proposers (validators). Technical integration requires:

  • Standardized APIs: Such as the Builder API (mev-boost) for Ethereum, defining how builders submit execution payloads and bids.
  • Bid Authentication: Verifying the cryptographic signatures of builders on their bids.
  • Payload Delivery: Securely delivering the winning block payload to the proposer just in time for inclusion, often using TLS-encrypted connections.
05

Data Availability & Attestation

Relays must provide cryptographic proofs that the data they handle is available and correct. This involves:

  • Header Broadcast: Distributing the block header (including commitments like the transactions root) immediately upon receipt.
  • Data Hosting: Making the full block body available for download by validators and other nodes for a sufficient time window.
  • Attestation Signing: In some designs, relays may provide signed attestations that a valid payload was delivered, which can be used in slashing protocols.
06

Security Considerations

Implementing a secure relay requires guarding against specific attack vectors:

  • DoS Protection: Rate-limiting and sybil resistance to prevent network flooding.
  • MEV Extraction by Relay: Preventing the relay itself from frontrunning or stealing MEV from user transactions.
  • Timing Attacks: Ensuring the proposer receives the block with enough time to publish it, mitigating time-bandit attacks.
  • Software Vulnerabilities: Regular audits of the relay client code and dependency management are critical.
ecosystem-usage-examples
PERMISSIONLESS RELAY

Ecosystem Examples and Implementations

Permissionless relays are foundational infrastructure, enabling open access to blockchain data and transaction submission. These are key implementations across various blockchain layers and services.

security-considerations
PERMISSIONLESS RELAY

Security Considerations and Challenges

While permissionless relays enhance censorship resistance and decentralization, they introduce unique security challenges that must be managed by application developers and users.

01

Relay-Level Censorship

A permissionless relay operator can technically censor transactions by refusing to include them in a block, even if they are valid. This is distinct from validator-level censorship. Mitigations include:

  • Relay Diversity: Users and builders can submit transactions to multiple relays.
  • Incentive Alignment: Relays are economically motivated to include profitable transactions (e.g., those with high MEV).
  • Fallback Mechanisms: Builders can be configured with a list of backup relays.
02

Malicious or Faulty Relay Operators

Since anyone can run a relay, the network must be resilient to relays that are buggy, malicious, or go offline. Key risks include:

  • Data Availability: A relay could withhold block data after winning an auction.
  • Invalid Headers: Submitting blocks with invalid execution payloads.
  • Liveness Failures: A relay crashing can disrupt block production for dependent builders. Defenses rely on builder reputation systems, slashing conditions in some designs, and builders quickly switching to reliable relays.
03

MEV Extraction and Manipulation

Relays are central hubs for MEV (Maximal Extractable Value) flow. This creates attack vectors:

  • Transaction Ordering: A relay can reorder transactions within a block to extract value, potentially harming users.
  • Frontrunning & Sandwich Attacks: Relays have privileged view of pending transactions from builders.
  • Collusion: A relay could collude with a specific builder or validator to capture MEV unfairly. Solutions include encrypted mempools and fair ordering protocols to reduce the relay's exploitable information.
04

Centralization and Trust Assumptions

Despite being permissionless, relay operation tends to centralize due to economies of scale, high-performance requirements, and the need for validator trust. Challenges:

  • De Facto Centralization: A few dominant relays create systemic risk; if compromised, they could halt the chain.
  • Trusted Setup: Validators must explicitly trust a relay's list to receive blocks, creating a social consensus layer.
  • Data Relay Reliance: The ecosystem depends on relays for fast, reliable block data propagation.
05

Implementation Bugs and Exploits

Relay software is complex, handling sensitive signing operations, network communication, and cryptographic proofs. Bugs can be catastrophic:

  • Signature Verification Flaws: Could allow invalid blocks to be accepted.
  • Logic Errors: In auction mechanisms or slashing conditions.
  • Network Attacks: DoS attacks against a relay's public API. Rigorous auditing, bug bounty programs, and implementation diversity are critical for security.
06

Regulatory and Legal Risk

Operating a permissionless relay may expose the operator to legal scrutiny, as they facilitate all transactions on-chain, including those from sanctioned addresses or involving illicit activities. This creates tension between censorship resistance and compliance, potentially forcing relays to geofilter or block certain transactions to avoid legal liability, undermining the permissionless ideal.

PERMISSIONLESS RELAY

Frequently Asked Questions (FAQ)

Essential questions and answers about permissionless relay networks, their role in blockchain infrastructure, and their impact on transaction censorship resistance.

A permissionless relay is a network of independent nodes that compete to forward user transactions to a blockchain's public mempool without requiring authorization from any central entity. It works by allowing any user to broadcast a transaction to one or more relay nodes. These nodes then propagate the transaction to other nodes in the network, ultimately delivering it to block builders or validators. This decentralized propagation mechanism prevents any single gateway from censoring or blocking transactions based on their content, origin, or destination. Key examples include the Flashbots SUAVE relay and the bloXroute network, which operate without a whitelist for users or transaction submitters.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Permissionless Relay: Definition & Role in MEV PBS | ChainScore Glossary