Grinding Attack
Security● Common
Attempts to manipulate Bitcoin mechanisms by iterating through variations to find favorable outcomes. Examples: vanity address generation, timelock grinding in contracts, signature malleation.
Technical Notes
Timelock grinding: CHECKLOCKTIMEVERIFY with block height vs timestamp can be manipulated in ~512 second window. Signature grinding: R value variations. Mitigations: careful protocol design, limiting attacker-controlled variability.
Metadata
Visibility: Public
Created:1/3/2026by System