Relays and private order flow infrastructure can introduce vulnerabilities that malicious actors exploit for MEV extraction, bypassing intended protections.

Claim

Quotes that support claims

This vulnerability enabled the attacker to extract transactions and construct a block that effectively stole funds from multiple sandwich bots
The attack exposed a significant vulnerability in a relay system, which allowed the brothers to manipulate the block validation process.

Related topics

Maximal Extractable Value (MEV)

Referenced by

Regulation, mitigation, and ethics

Crypto

Data block