CCIP Service Limits (EVM)

Mainnet

ItemDescriptionLimit
Maximum message data lengthdata payload sent within the CCIP message30 kilobytes
Message Execution Gas LimitUser specified gas limit

Exception: Lanes originating from CORN have a maximum gas limit of 500,000.
3,000,000
Maximum number of tokensMaximum number of distinct tokens a user can transfer in a single transaction.1
Token Pool Execution Gas LimitMaximum gas for executing the combined steps in token pools during cross-chain transfers, including: (1) balanceOf check before minting/releasing, (2) releaseOrMint function, and (3) balanceOf check after minting/releasing. For more details on building custom token pools and handling gas constraints, refer to the Token Pools documentation.90,000

Testnet

ItemDescriptionLimit
Maximum message data lengthdata payload sent within the CCIP message30 kilobytes
Message Execution Gas LimitUser specified gas limit

Exception: Lanes originating from CORN have a maximum gas limit of 500,000.
3,000,000
Maximum number of tokensMaximum number of distinct tokens a user can transfer in a single transaction1
Token Pool Execution Gas LimitMaximum gas for executing the combined steps in token pools during cross-chain transfers, including: (1) balanceOf check before minting/releasing, (2) releaseOrMint function, and (3) balanceOf check after minting/releasing. For more details on building custom token pools and handling gas constraints, refer to the Token Pools documentation.90,000

Network-Specific Limitations

Some EVM networks have additional constraints beyond the standard limits above:

NetworkSpecial ConsiderationsDocumentation
HyperEVMData availability limitations during RPC downtimeHyperEVM Service Limits

Private / Permissioned Network Limitations

Some CCIP integrations are with private / permissioned networks (see list below). CCIP's integration with these networks depends on a single centralized RPC provider rather than a distinct set of local nodes or RPCs utililized by node operators. As a result:

  • Transaction data sourced from these networks cannot be independently verified across multiple nodes in the same way as public chains.
  • A compromised RPC provider could manipulate transaction data, up to and including theft of bridged funds.
  • Anomalous or malicious activity on these networks may be harder to detect and alert on, as monitoring infrastructure relies on the same private RPC layer.

Developers and integrators building CCIP integrations on private / permissioned networks should review these constraints carefully and implement additional safeguards appropriate to their application's use case. These include, but not limited to: more conservative token pool rate limits, monitoring of messages and token transfers, and emergency preparedness.

Private / permissioned networks:

Get the latest Chainlink content straight to your inbox.