Attack Vectors & Scenarios

Comprehensive analysis of potential attack vectors and their impact on client performance

⚔️

Submit your attack vector ideas!

Click to contribute attack scenarios

Transient-storage bloating attack ranking

Ranked by gas cost per transient byte (lowest to highest cost - lower is more efficient for attackers). Hover over or click on any row to view detailed technical information.

Rank Technique Cost per Transient Byte Details
🥇
Cold BALANCE/EXTCODEHASH probe on never-seen EOAs
2600 gas cold probe
23 g/B (2,600 gas ÷ 112 Bytes)
23 g/B (2,600 gas ÷ 112 Bytes)
0 B
112 B read each
Spammer iterates millions of pseudo-random addresses, thrashing the account-trie cache
🥈
Cold SLOAD over many distinct storage slots
Multiple storage slot access
66 g/B (2,100 gas ÷ 32 Bytes)
66 g/B (2,100 gas ÷ 32 Bytes)
0 B
32 Bytes read
Every new slot hits the disk; warm repeats are only 100 gas but read no new bytes
🥉
SSTORE 0→x then x→0 in same tx
Storage manipulation attack
475 g/B ((20,000 - 4,800) gas ÷ 32 Bytes)
475 g/B ((20,000 - 4,800) gas ÷ 32 Bytes)
0 B
64 Bytes written & erased
Refund now capped to 1⁄5 of gas used (EIP-3529) so attack lost ¾ of its edge

Cost Efficiency Analysis

🏆

Most Efficient Attack

Balance probes with 23 g/B provide the lowest cost per byte, making them highly scalable for attackers

⚖️

Moderate Efficiency Attack

Cold SLOAD attacks with 66 g/B offer moderate cost efficiency for storage-based attacks

💰

Least Efficient Attack

Storage manipulation attacks with 475 g/B are expensive per byte but can cause significant damage

Miscellaneous bloat-state-based attacks

Attack vectors that don't necessarily occur naturally or are craftable per-se, but could appear and need testing. Hover over or click on any row to view detailed technical information.

Attack Description Details

Submit Attack Vector

Help us identify potential attack vectors that could impact Bloatnet's performance and security

Loading attack vector submission form...

Contribute to Security Research

Help us identify and analyze potential attack vectors for Ethereum's scaling future

← Back to Home