Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Block Stuffing Attack

1 min read
Pronunciation
[blok stuhf-ing uh-tak]
Analogy
Like stuffing a mailbox with junk mail so the postman can’t deliver legitimate letters efficiently.
Definition
A denial‑of‑service tactic where an attacker fills blocks with spam or low‑value transactions to bloat block size, increase fees, and slow network processing.
Key Points Intro
Block stuffing exploits block size/gas limits to degrade performance and extract fees.
Key Points

Spam TX: Floods mempool with many small or complex transactions.

Fee manipulation: Bids minimal fees to fill blocks, forcing others to overpay.

Network congestion: Increases propagation time and orphan risk.

Resource exhaustion: Drives up storage and computation costs for nodes.

Example
An attacker submits thousands of zero‑value ERC‑20 transfers with minimal gas price, causing blocks to reach gas limits and delaying genuine transactions.
Technical Deep Dive
Attack scripts use private key pools to bypass per-address limits, broadcast via flashbots to ensure inclusion. They optimize TX size to maximize gas usage per byte. Nodes experience high GC pressure on trie updates and increased block processing time.
Security Warning
Block stuffing can lead to elevated user fees and potential chain splits if nodes lag; implement per‑address rate limits and dynamic gas pricing.
Caveat
Mitigations like EIP‑1559 dynamic fees reduce incentives but do not eliminate risk entirely.

Block Stuffing Attack - Related Articles

No related articles for this term.