Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Bundle Propagation

Bundle propagation is the process of transmitting a bundle of transactions from a searcher to a block builder, typically through a private relay network to prevent frontrunning.
Chainscore © 2026
definition
BLOCKCHAIN NETWORKING

What is Bundle Propagation?

Bundle propagation is a network-level mechanism for efficiently broadcasting multiple transactions as a single, atomic unit to validators.

Bundle propagation is the process by which a searcher or block builder transmits a bundle—a collection of transactions intended for atomic, ordered execution—to network validators or proposers. This is a core networking primitive in MEV (Maximal Extractable Value) ecosystems, designed to ensure the integrity and order of a complex transaction sequence as it travels across the peer-to-peer network. Unlike standard transaction gossip, bundle propagation often uses dedicated, high-reliability channels or private mempools to prevent front-running and guarantee that the entire bundle is delivered as a single, indivisible payload.

The primary goal is to preserve atomicity and ordering, which are critical for the profitability and success of sophisticated MEV strategies like arbitrage or liquidations. If transactions within a bundle were propagated individually via the public mempool, they could be intercepted, reordered, or copied by competing searchers in a practice known as generalized front-running. By propagating the entire bundle directly to a block producer, the searcher ensures their transaction sequence is considered as a single, all-or-nothing operation, protecting the strategy's economic logic. This is often facilitated by specialized relay networks that sit between searchers and validators.

Technically, bundle propagation interfaces with a blockchain's consensus layer through submission protocols like mev-boost on Ethereum. A propagated bundle typically includes metadata such as a block number target, a signature for authentication, and conditions for its inclusion. Validators or builders receiving the bundle can then evaluate its fees and potential to maximize their own revenue before deciding to include it in a proposed block. This creates a marketplace where the speed and reliability of propagation are key competitive factors for searchers.

The efficiency of bundle propagation directly impacts network dynamics and centralization pressures. High-performance, private propagation networks can create advantages for well-capitalized players, raising concerns about fair access. However, these systems also reduce failed transactions and wasted gas from public mempool competition, potentially improving overall network efficiency. Protocols continue to evolve, with concepts like suave aiming to decentralize the bundle creation and propagation process itself.

how-it-works
BLOCKCHAIN NETWORKING

How Bundle Propagation Works

Bundle propagation is the process by which a collection of transactions, known as a bundle, is transmitted and validated across a peer-to-peer blockchain network.

Bundle propagation is a network-level mechanism where a searcher or block builder transmits a pre-arranged set of transactions—a bundle—to validators (or block producers) for inclusion in a block. This process is distinct from standard transaction gossip, as bundles are often designed to execute complex, multi-step operations atomically, such as arbitrage or liquidations. The propagation occurs over specialized peer-to-peer networks like the mev-geth or mev-boost relay network, which are optimized for speed and reliability to ensure the bundle reaches validators before the next block is proposed.

The protocol typically involves the sender signing the bundle with their private key and submitting it to a trusted relay. The relay validates the bundle's format, simulates its execution to ensure it is valid and profitable, and then forwards it to connected validators. This simulation step is critical; it prevents invalid or unprofitable bundles from wasting network resources and validator attention. For maximum effectiveness, propagation must occur within the narrow window between blocks, making low-latency network connections and efficient serialization formats like SSZ (Simple Serialize) essential components of the system.

A key challenge in bundle propagation is censorship resistance. Centralized relays could theoretically filter or reorder bundles. In response, protocols like SUAVE (Single Unifying Auction for Value Expression) are being developed to decentralize this layer. Furthermore, the rise of PBS (Proposer-Builder Separation) architectures has formalized this propagation pathway, creating a clear market where builders compete to propagate the most valuable bundles to proposers. The efficiency of this propagation directly impacts the economic security and MEV (Maximal Extractable Value) extraction dynamics of the blockchain.

key-features
MECHANICS

Key Features of Bundle Propagation

Bundle propagation is a core mechanism for improving transaction ordering and censorship resistance in blockchains. These features define how bundles are structured, transmitted, and executed.

01

Atomic Execution

A bundle is a set of transactions that must be executed atomically—either all transactions succeed and are included in a block, or the entire bundle fails. This is enforced by the block builder and prevents MEV extraction from partial execution. For example, an arbitrage bundle containing a swap and a liquidation will only be valid if both actions can be performed in the same state transition.

02

Permissionless Submission

Any participant, such as a searcher or user, can submit a bundle to the network's relay or mempool without requiring special permissions. This open access is fundamental to credible neutrality and prevents centralized control over transaction ordering. Submissions are typically made via a standardized JSON-RPC endpoint to a network of relays.

03

Time-Based Validity

Bundles are often constrained by a validity window defined by a start and end block height or timestamp. This ensures bundles are only considered for inclusion during a specific period, preventing stale transactions from clogging the network. For instance, a bundle may be valid only for blocks #15,000,001 to #15,000,005.

04

Simulation & Pre-Validation

Before propagation, bundles are simulated locally by the submitter against a recent blockchain state to ensure they are profitable and valid. Relays and builders also perform pre-checks (e.g., signature verification, gas limits) to protect network integrity. Failed simulations result in immediate rejection, saving block builder resources.

05

Relay Network Architecture

Bundles are propagated through a decentralized network of relays, which act as intermediaries between searchers and block builders. Key functions include:

  • Receiving and validating bundles.
  • Aggregating bundles from multiple searchers.
  • Forwarding the most profitable bundle set to builders. This architecture separates trust and creates a competitive market for block space.
06

Builder-Pay-User Model

A common incentive structure where the block builder compensates the end-user for the right to include their transaction in a profitable bundle. The payment, often called a rebate or refund, is deducted from the MEV extracted by the searcher and builder. This model aligns incentives, improving user experience by reducing net transaction costs.

ecosystem-usage
BUNDLE PROPAGATION

Ecosystem Usage

Bundle propagation is the process of distributing a bundle of transactions across a network's peer-to-peer (P2P) layer to ensure validators can include it in a block. This is a critical step for the performance and security of block builders and searchers.

01

P2P Network Distribution

After a block builder constructs a bundle, it must be broadcast to the network's validators. This is done via a specialized P2P network (e.g., the builder's own relay network or a public mempool). Efficient propagation minimizes latency, increasing the bundle's chance of being included in the next block. Key mechanisms include:

  • Gossip protocols for rapid, decentralized dissemination.
  • Direct connections to trusted validator nodes for priority submission.
  • Redundancy to ensure delivery even if some network paths fail.
03

Guarantees & Commitments

Propagation involves cryptographic commitments to ensure fairness and execution. The builder submits a header with a commitment to the bundle's hash and fee. The proposer (validator) signs a commitment to include that header if it's the most profitable. Only after these commitments are exchanged is the full bundle content revealed and executed. This commit-reveal scheme prevents front-running and ensures the builder's transaction order is preserved.

04

Failure Modes & Censorship

Propagation can fail, leading to bundle non-inclusion. Common causes:

  • Network Latency: The bundle arrives after the validator's cutoff time.
  • Relay Downtime: The chosen relay is offline or slow.
  • Censorship: A relay or validator may censor specific transactions or addresses. To mitigate this, builders often use multiple propagation paths (e.g., submitting to several relays simultaneously) to maximize redundancy and resist censorship.
05

Searcher-Builder Coordination

Searchers (who find profitable MEV opportunities) rely on builders for propagation. They send their transaction bundles to builders via private RPC endpoints or public channels. The builder then aggregates, simulates, and propagates the final bundle. This relationship is governed by:

  • Submission APIs (e.g., eth_sendBundle).
  • Simulation checks to ensure bundle validity and profitability.
  • Payment flows where searchers include tips for both the builder and the validator.
06

Cross-Chain & L2 Considerations

Propagation mechanics differ across ecosystems. On Ethereum, it's heavily reliant on the proposer-builder separation (PBS) model and relays. On Solana, bundles are called "packets" and are propagated directly to leaders via the Gulf Stream protocol. For Layer 2s (Rollups), bundles are often propagated to the sequencer, which is responsible for ordering and posting data to L1. Understanding the target chain's architecture is essential for effective propagation.

visual-explainer
BLOCKCHAIN NETWORKING

Visual Explainer: The Propagation Path

This visual explainer traces the journey of a transaction bundle from its creation by a user to its final inclusion in a block, highlighting the critical role of network propagation in blockchain performance and security.

Bundle propagation is the process by which a set of related transactions, known as a bundle, is broadcast and relayed across a peer-to-peer (P2P) network of nodes until it reaches a block builder or validator. This path is not a straight line; it follows a gossip protocol where each node that receives the bundle forwards it to a subset of its connected peers, creating a rapid, decentralized dissemination web. The speed and reliability of this propagation directly impact a bundle's chances of being included in the next block, as builders prioritize transactions they see first.

The propagation path begins when a user submits a bundle, typically via a specialized service like a relayer or bundler, to an entry point node. This node validates the bundle's basic integrity—checking for valid signatures and sufficient fees—before adding it to its mempool (memory pool) and initiating the gossip process. Nodes employ strategies like transaction rebroadcasting and compact block relay to optimize bandwidth and reduce latency, ensuring the bundle reaches a critical mass of network participants, including competing block builders, as quickly as possible.

Several factors influence the efficiency of the propagation path. Network topology and node connectivity determine how many hops the bundle must take. Network latency and bandwidth constraints can cause delays, creating opportunities for front-running or time-bandit attacks if a malicious actor sees a profitable bundle before others. To mitigate this, services may use private mempools or direct peer-to-peer channels to trusted builders, creating a more controlled, though less decentralized, propagation path to guarantee inclusion.

security-considerations
BUNDLE PROPAGATION

Security and Trust Considerations

The process of distributing a bundle of transactions across the network introduces specific security vectors and trust assumptions that differ from standard transaction broadcasting.

01

Relier Trust Assumption

A user submitting a transaction to a searcher or builder must trust that entity to faithfully propagate the bundle. This creates a trusted third-party dependency outside the core protocol. Malicious actors could:

  • Censor the transaction.
  • Front-run or sandwich the user's trade.
  • Withhold the bundle to exploit private information.
02

Network-Level Propagation Risks

Bundles are often propagated via peer-to-peer (P2P) networks separate from the standard transaction mempool. This introduces risks:

  • Eclipse Attacks: A malicious node could isolate a builder to manipulate bundle visibility.
  • Propagation Delays: Slow or incomplete propagation can lead to bundles arriving too late, causing failed transactions and lost fees.
  • Network Partitioning: Faulty or malicious gossip can prevent bundles from reaching critical validators.
03

Builder Centralization & Censorship

The economic efficiency of bundle propagation favors large, well-connected block builders. This can lead to:

  • Centralization Pressure: A small set of dominant builders control bundle inclusion.
  • Protocol-Level Censorship: Builders could systematically exclude transactions from certain addresses or protocols (e.g., OFAC-sanctioned addresses).
  • MEV Extraction Monopolies: Concentrated control over bundle ordering maximizes extractable value for the builder, not the user.
04

Data Availability & Withholding

A critical security risk is data withholding, where a builder creates a block containing a bundle but only reveals it after the block is proposed. This can be used for:

  • Time-Bandit Attacks: Attempting to reorg the chain based on newly revealed information.
  • Adversarial MEV: Extracting value in ways that are impossible if the bundle were public. Solutions like commit-reveal schemes and encrypted mempools aim to mitigate this.
05

Bundler as a Single Point of Failure

The entity that constructs and signs the bundle (bundler) becomes a single point of failure for the entire operation. Compromise of the bundler's private key allows an attacker to:

  • Steal all assets within the bundle's smart contracts.
  • Rug pull users by submitting malicious transactions.
  • Damage reputation of the associated application or service.
06

Verification & Execution Guarantees

Unlike a single transaction, a bundle's atomic execution is only guaranteed if all constituent transactions succeed. This creates complex failure states:

  • Partial Failure: One failed transaction can revert the entire bundle, wasting gas on prior successful ones.
  • State Contention: Bundles are vulnerable to nonce conflicts and state changes from other blocks during propagation.
  • Simulation Accuracy: Users rely on the bundler's pre-execution simulation, which may not perfectly match live chain state.
PROPAGATION CHANNELS

Comparison: Public Mempool vs. Private Bundle Propagation

Key differences between submitting transactions to the public mempool versus using a private relay network for bundle propagation.

Feature / MetricPublic MempoolPrivate Bundle Relay

Transaction Visibility

Public to all network participants

Private to relay operators and selected builders

Frontrunning / MEV Risk

Latency to Builder

Variable, often > 1 sec

Guaranteed, typically < 500 ms

Submission Guarantee

Required Infrastructure

Standard RPC node

Relay API endpoint & auth

Typical Cost

$0

$10-50 per bundle

Censorship Resistance

Primary Use Case

Simple transfers, low-value swaps

Arbitrage, liquidations, NFT minting

BUNDLE PROPAGATION

Common Misconceptions

Clarifying frequent misunderstandings about how transaction bundles are transmitted and prioritized across the network.

No, bundle propagation is distinct from standard transaction gossip. Standard gossip involves individual transactions being broadcast peer-to-peer in a mempool. In contrast, a bundle is a set of transactions with a specific, often private, execution order and atomicity guarantee. These bundles are typically propagated through specialized, permissioned relay networks or direct searcher-builder channels to ensure they are not broken apart or frontrun, which would not be possible over the public peer-to-peer gossip layer.

BUNDLE PROPAGATION

Frequently Asked Questions (FAQ)

Common questions about the process of transmitting and ordering transaction bundles across the mempool and block builders.

Bundle propagation is the process of transmitting a pre-ordered set of transactions, known as a bundle, from a user or searcher to network validators and block builders. It works by leveraging a network of relays and builders to ensure the bundle is delivered intact and considered for inclusion in the next block. The goal is to guarantee atomicity—either all transactions in the bundle succeed, or the entire bundle fails, preventing undesirable partial execution. This mechanism is central to MEV (Maximal Extractable Value) strategies and user applications requiring complex, multi-step transaction logic on networks like Ethereum.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
Bundle Propagation: Definition & Process in MEV | ChainScore Glossary | ChainScore Labs