Grinding Attack
Security● Common

Attempts to manipulate Bitcoin mechanisms by iterating through variations to find favorable outcomes. Examples: vanity address generation, timelock grinding in contracts, signature malleation.

Technical Notes

Timelock grinding: CHECKLOCKTIMEVERIFY with block height vs timestamp can be manipulated in ~512 second window. Signature grinding: R value variations. Mitigations: careful protocol design, limiting attacker-controlled variability.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions