Bundler mempool management: fairness, eviction, and spam resistance

UserOperation mempools: admission, eviction, prioritization, and DoS defenses that keep bundler throughput stable under spam and congestion. ibex.fi ibex.fi

5 min read

Who this is for

  • Backend engineers
  • Protocol researchers
  • SRE teams

Pros / cons

ProsCons
  • Protects inclusion quality for paying users
  • Reduces wasted simulation work
  • Improves predictability under load
  • Complex policy tuning
  • Potential centralization debates
  • Risk of unfair exclusion if misconfigured

Key takeaways

  • Cap per-sender queues with transparent rules
  • Prioritize by fee and reputation signals
  • Log evictions with reasons for audits

Anatomy of a UserOperation mempool policy

Mempool policies decide what enters, what stays, and what leaves. Entry gates include signature validity, minimum fee thresholds, paymaster deposit checks, and basic gas limit sanity. Stay rules manage maximum mempool size, per-address counts, replacement fee bumps, and time-to-live. Eviction policies remove stale or underpriced operations when space is scarce. Transparency matters—wallet developers should understand why operations disappear. Policies must be chain-aware: L2 sequencers behave differently from L1 public mempools. Decentralized ethos encourages interoperability, but pragmatic bundlers implement protections against resource exhaustion. IBEx teams should document policies publicly where safe and provide debug endpoints for partners. Legal review may apply if policies resemble network management with business implications. Metrics should track eviction reasons, queue depths, and age distributions. Tune policies using captured traces from real traffic, not only synthetic tests. Publish policy changelogs when material updates ship. Document assumptions for auditors and partners: who can change parameters, how keys are stored, what data leaves your perimeter, and how users are notified when behavior changes. Prefer staged rollouts behind feature flags and cohort allowlists so you can observe metrics on a slice of traffic before exposing new sponsorship rules or bundler paths broadly. Build admin tools that reconstruct a user journey from hash to policy decision without exposing secrets, so support and risk teams share a single source of truth during disputes. Align marketing claims with measured SLOs; nothing erodes trust faster than promising gasless UX while deposits silently approach empty during a weekend campaign. Educate engineers on ERC-4337 edge cases—signature aggregation quirks, opcode restrictions across chains, and entry point version drift—because production incidents often trace to spec misunderstandings, not malice.

Prioritization under congestion

When block space tightens, prioritization determines who gets included. Common factors include effective gas price, bundler reputation weighting, client SLAs, and fairness floors for small users. Be cautious privileging partners without disclosure—communities notice. Dynamic prioritization can adapt to observed inclusion times. Combine economic and non-economic signals carefully to avoid discriminatory outcomes lacking justification. Attackers may manipulate priorities via fee bumps; set limits on replacement storms. Coordinate with paymasters so sponsored operations still compete fairly—sponsorship is not a bypass for mempool physics. IBEx ecosystem credibility grows when prioritization aligns with published rules. Postmortems after congestion events should evaluate whether policies amplified harm. Train support to explain delays honestly. Consider academic collaborations to study fairness empirically rather than relying on vibes. Operational maturity means boring releases: changelog discipline, semver for APIs, and communication windows that respect integrators across time zones. Product analytics should join off-chain cohorts to on-chain receipts with stable keys; otherwise funnels lie and growth teams optimize the wrong surfaces. Train support on phishing patterns and recovery policies; human empathy plus consistent scripts reduces panic transfers that amplify fraud losses. IBEx Network teams routinely pair these ideas with explicit runbooks, on-call rotations, and vendor SLAs so Web3 infrastructure behaves like payments infrastructure when traffic spikes. Treat configuration as code: version policy changes, require reviews, and replay historical UserOperation samples after upgrades to catch regressions before users do. Instrument everything that influences inclusion—RPC lag, bundler version, paymaster deposit runway, and signature validation latency—because correlated failures hide inside averages until a launch proves otherwise.

DoS resistance and resource accounting

Denial-of-service against bundlers wastes CPU on simulations and fills queues with junk. Mitigate with proof-of-work challenges, authenticated client keys, IP rate limits used judiciously, and deposits for high-volume senders. Account resource usage per peer and throttle abusers automatically. Isolate expensive simulation paths behind dedicated pools so they cannot starve core traffic. Watch for algorithmic complexity attacks in untrusted calldata. Use fuzzing on decoders. Maintain kill switches for known attack patterns. IBEx security posture extends to mempool edges—monitor globally for coordinated spikes. Collaborate with other operators when attacks are ecosystem-wide. Document responsible disclosure channels for mempool vulnerabilities. FinOps should watch compute bills; sudden jumps often precede user-visible degradation. Align marketing claims with measured SLOs; nothing erodes trust faster than promising gasless UX while deposits silently approach empty during a weekend campaign. Educate engineers on ERC-4337 edge cases—signature aggregation quirks, opcode restrictions across chains, and entry point version drift—because production incidents often trace to spec misunderstandings, not malice. For multi-chain programs, centralize a compatibility matrix and test vectors per network; copy-pasting configs across chains is how subtle validation bugs become expensive outages. When incidents occur, communicate timelines honestly, freeze risky surfaces quickly, and publish remediation steps; communities and enterprises reward calm precision over bravado. Security reviews should include abuse economics, not only smart contract logic: if an attacker profits more than you detect, controls will fail no matter how clever the Solidity looks. Retention metrics should incorporate failed transactions and support tickets, not only successful mints—sponsorship programs that look successful on dashboards can still churn users silently.

Observability and continuous policy tuning

Emit events for accept, reject, evict with codes. Dashboard queue health by chain. Alert on sustained growth in evictions or drops in average fees. Run periodic policy reviews with engineering, product, and community representatives where applicable. Replay historical attack windows to verify defenses improved. IBEx Network-style reliability means mempool management is never static—attackers evolve, products evolve, chains evolve. Invest in tooling to simulate policy changes offline against captured datasets. Celebrate wins when inclusion stability improves measurably after tuning. Pair metrics with qualitative feedback from wallet partners in monthly syncs. Instrument everything that influences inclusion—RPC lag, bundler version, paymaster deposit runway, and signature validation latency—because correlated failures hide inside averages until a launch proves otherwise. Document assumptions for auditors and partners: who can change parameters, how keys are stored, what data leaves your perimeter, and how users are notified when behavior changes. Prefer staged rollouts behind feature flags and cohort allowlists so you can observe metrics on a slice of traffic before exposing new sponsorship rules or bundler paths broadly. Build admin tools that reconstruct a user journey from hash to policy decision without exposing secrets, so support and risk teams share a single source of truth during disputes. Align marketing claims with measured SLOs; nothing erodes trust faster than promising gasless UX while deposits silently approach empty during a weekend campaign. Educate engineers on ERC-4337 edge cases—signature aggregation quirks, opcode restrictions across chains, and entry point version drift—because production incidents often trace to spec misunderstandings, not malice. For multi-chain programs, centralize a compatibility matrix and test vectors per network; copy-pasting configs across chains is how subtle validation bugs become expensive outages.

Frequently asked questions

How is this different from Ethereum tx mempools?

UserOperations are higher-level objects validated through entry point rules; policies must account for paymasters, accounts, and simulation costs.

Can mempools censor?

Operators choose policies; decentralization efforts aim for alternatives. Be transparent and mindful of legal and ethical constraints.

What metric signals mempool stress?

Rising queue depth, growing time-to-inclusion, and spikes in evictions or simulation errors—often precursors to user-visible delays.