Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
web3-philosophy-sovereignty-and-ownership
Blog

The Future of MEV: User-Controlled Transaction Bundling

The current MEV supply chain is broken. Searchers and validators extract billions from user slippage. New models like intent-based protocols flip the script, letting users define and own their execution path. This analysis explores the technical and economic shift from extractive to user-owned MEV.

introduction
THE SHIFT

Introduction

The MEV supply chain is evolving from a searcher-dominated market into a user-controlled execution layer.

User-controlled transaction bundling inverts the MEV power dynamic. Instead of searchers extracting value from user transactions, users and their agents proactively construct and auction their own bundles. This transforms MEV from a tax into a rebate.

The catalyst is intent-based architecture. Protocols like UniswapX and CowSwap abstract execution complexity into declarative goals. This creates a standardized, composable input for a new class of solver networks to compete on fulfilling.

The endpoint is programmable privacy. User bundles enable pre-confirmation privacy via mechanisms like threshold encryption, as seen with Flashbots SUAVE. This prevents frontrunning while preserving the auction's economic efficiency.

Evidence: Over 60% of DEX volume on Ethereum now flows through intent-based or private mempools, according to EigenPhi. This is the baseline for the next evolution.

key-insights
THE NEXT FRONTIER

Executive Summary

MEV is shifting from a searcher-dominated extractive game to a user-centric design space where transaction ordering becomes a programmable primitive.

01

The Problem: Opaque Extraction

Users lose ~$1B+ annually to frontrunning and sandwich attacks. The value of their transaction order flow is captured by opaque, centralized searcher networks, creating systemic risk and poor UX.\n- Value Leakage: Profits flow to third parties, not users or protocols.\n- Centralization Pressure: Dominant builders/relays create single points of failure.

$1B+
Annual Extract
>80%
Relay Share
02

The Solution: Intents & SUAVE

Users express desired outcomes (intents) instead of rigid transactions, delegating execution to a competitive solver network. Projects like UniswapX, CowSwap, and Across pioneered this. SUAVE aims to be a decentralized, mempool-less blockchain for intent expression and execution.\n- User Sovereignty: Control over order flow and its monetization.\n- Efficiency Gains: Solvers compete, driving down costs and improving price execution.

10-50%
Better Prices
0
Sandwich Risk
03

The New Stack: Programmable Bundling

User-controlled bundling creates a new middleware layer. Protocols can programmatically bundle user actions (e.g., deposit + stake + hedge) into atomic, MEV-optimized transactions. This enables complex DeFi strategies as single-click actions.\n- Composability: Bundles become new financial primitives.\n- Revenue Recapture: Protocols and users can share bundling fees.

1-Click
Complex Strategies
New Sinks
Protocol Revenue
04

The Endgame: MEV as a Public Good

With user-controlled flow, MEV can be transparently auctioned and its value redirected. Flashbots' MEV-Share and MEV-Boost++ are early experiments in redistributing profits back to users. This realigns incentives, making network security a beneficiary of economic activity.\n- Redistribution: MEV profits fund user rebates or protocol treasuries.\n- Aligned Security: Value strengthens the underlying chain's economic security.

>90%
Rebate Potential
Sustainable
Security Model
thesis-statement
THE FUTURE OF BUNDLING

Thesis: MEV is a User-Owned Asset

The next evolution of MEV infrastructure shifts control from searchers to users, enabling them to capture and monetize their own transaction value.

User-owned MEV is the logical endpoint of permissionless finance. The current model, where searcvers and builders extract value from user transactions, is an intermediary inefficiency. Protocols like Flashbots SUAVE and CoWSwap demonstrate that users can directly express and fulfill their own transaction intents.

Intent-based architectures invert the power dynamic. Instead of users signing raw transactions for searcvers to exploit, they sign high-level intents (e.g., 'swap X for Y at best price'). Solvers like UniswapX and Across compete to fulfill these intents, with the user capturing the surplus value as a rebate or better execution.

The bundling market will fragment. Generalized intent solvers will compete with specialized user-operated bundlers. A user's transaction flow—a swap on Uniswap, a bridge via LayerZero, and a deposit into Aave—becomes a single, monetizable bundle they can auction.

Evidence: On CoWSwap, over 90% of trades are settled via its batch auction mechanism, which inherently eliminates frontrunning and returns MEV as better prices to users. This model proves value redistribution is technically feasible and economically superior.

market-context
THE STATUS QUO

The $1B+ Extraction Economy

MEV is a structural tax on blockchain users, with searchers and builders capturing value that protocols and users should own.

MEV is a tax. Searchers and builders extract over $1B annually by reordering, inserting, and censoring transactions. This value leaks from DeFi protocols and retail users to sophisticated operators.

The infrastructure is adversarial. Protocols like Flashbots' SUAVE and Jito optimize for extractor profit, not user or protocol benefit. This creates a principal-agent problem where the network's builders work against its users.

User-controlled bundling flips the model. Instead of searchers bundling user transactions for arbitrage, users submit intent-based bundles that specify outcomes. This shifts bargaining power and captures value for the submitter.

Evidence: In 2023, Ethereum PBS captured $400M+ in MEV. Protocols like UniswapX and CowSwap demonstrate that intent-based, user-signed bundles reduce leakage and improve price execution.

FUTURE OF MEV

MEV Supply Chain: Who Captures What?

Comparison of transaction flow models based on who controls ordering and captures MEV value.

Key DimensionTraditional MempoolSearcher-Builder-Proposer (SBP)User-Controlled Bundling

Primary Ordering Control

Validators

Builders (e.g., Flashbots, bloXroute)

User / User Agent

MEV Value Capture

Validators & Searchers

Builders & Proposers

User (via rebates) or Protocol

User Transaction Privacy

Front-running Resistance

Partial (via private RPCs)

Required User Sophistication

None

None

High (or delegated to SUAVE, Anoma)

Typical Latency to Finality

6-12 seconds

12+ seconds (auction time)

Variable (intent settlement)

Key Protocols / Entities

Ethereum base layer

Flashbots MEV-Boost, bloXroute

UniswapX, CowSwap, Across, Anoma

Fee Extraction from User

Priority Gas Auction (PGA)

Bid from searcher bundle

None (subsidized by MEV capture)

deep-dive
THE CONTROL SHIFT

How Intent-Based Architectures Flip the Model

Intent-based systems invert the transaction model by letting users declare desired outcomes, not low-level instructions, shifting complexity and control to specialized solvers.

Users declare outcomes, not steps. Instead of signing a complex transaction, a user submits a signed intent, like 'swap X for Y at a minimum price.' This moves the burden of execution pathfinding and gas optimization to a competitive network of solvers, as seen in UniswapX and CowSwap.

Solvers compete on fulfillment. This creates a competitive solver market where entities like PropellerHeads and professional searchers bid to fulfill the intent most profitably. The user's transaction is no longer a single path but an auction for the best execution.

MEV extraction becomes permissioned. In this model, extractable value flows to the user. The solver's profit is the spread between their fulfillment cost and the user's specified limit price, aligning incentives. This flips the current model where value is captured by adversarial searchers.

Evidence: UniswapX processed over $7B in volume by Q1 2024, demonstrating user demand for gasless, MEV-protected swaps. Its architecture relies entirely on a permissionless network of off-chain solvers competing to fulfill user intents.

protocol-spotlight
THE FUTURE OF MEV

Protocol Spotlight: The New Stack

The next evolution in MEV shifts control from searchers to users, transforming transaction execution into a competitive marketplace.

01

The Problem: Opaque Searcher Cartels

Users blindly sign transactions, surrendering value to a black-box network of searchers and builders. This creates rent extraction, front-running, and centralized points of failure.

  • $1B+ in MEV extracted annually
  • ~80% of blocks built by 3-4 dominant entities
  • Zero visibility into execution path for users
$1B+
Annual Extract
~80%
Builder Centralization
02

The Solution: Intent-Based Architectures

Users declare what they want (e.g., "swap X for Y at best price"), not how to do it. Solvers like UniswapX and CowSwap compete to fulfill the intent, with MEV captured returned to the user.

  • Expressive orders (limit, TWAP, batched)
  • Competitive solver networks replace monopoly builders
  • Gas sponsorship and fee abstraction
100%
MEV Refund
-90%
Slippage
03

The Enabler: SUAVE - A Decentralized Block Building Market

A specialized chain for decentralized block building and cross-domain MEV capture. It separates credible commitment from execution, creating a neutral marketplace.

  • Universal preference environment for cross-chain intents
  • Encrypted mempool for transaction privacy
  • Decentralized builder network prevents censorship
Cross-Chain
Scope
Encrypted
Mempool
04

The Infrastructure: Private RPCs & Order Flow Auctions

Tools like Flashbots Protect RPC and BloxRoute's Private Transaction Service shield users from front-running. Order Flow Auctions (OFAs) allow wallets/apps to auction user flow to the highest bidder, redistributing value.

  • Direct integration with wallets (e.g., MetaMask)
  • Revenue share models for dApps
  • ~500ms latency for private tx inclusion
~500ms
Inclusion Latency
Revenue Share
dApp Model
05

The New Risk: Solver Centralization & Trust Assumptions

Intent systems shift trust from validators to solvers. A dominant solver network (Across, UniswapX) becomes a new central point of failure, requiring cryptoeconomic security and decentralized verification.

  • Solver bonding and slashing for liveness
  • Fraud proofs for incorrect execution
  • Multi-solver networks to prevent monopoly
New Trust
Model
Fraud Proofs
Verification
06

The Endgame: Programmable Intents & Autonomous Agents

Intents evolve into long-lived, stateful programs that continuously optimize user positions. Think "maintain this liquidity range" or "DCA weekly." This requires secure off-chain execution environments and verifiable on-chain settlement.

  • Intent-centric account abstraction (ERC-4337)
  • Agent-based wallet ecosystems
  • Composable cross-domain strategies
ERC-4337
Foundation
Autonomous
Agents
counter-argument
THE REALITY CHECK

Counterpoint: Centralization & Complexity Risks

User-controlled bundling introduces new attack surfaces and centralization vectors that could undermine its core promise.

User-controlled bundling centralizes power in a new class of specialized operators. The technical complexity of constructing optimal bundles and managing cross-chain state creates a high barrier to entry. This leads to a market dominated by a few sophisticated players like Flashbots' SUAVE or private searcher collectives, replicating today's MEV supply chain.

Cross-chain intent execution is fragile. A bundle spanning Ethereum and Solana via LayerZero or Wormhole must succeed atomically across multiple, asynchronous environments. A failure in one leg forces complex and costly remediation, a risk individual users cannot manage, pushing them back to trusted intermediaries.

The security model shifts risk from validators to users. In traditional MEV, searchers bear execution risk. With user-signed bundles, the user's signature authorizes any outcome, making them liable for unintended side-effects or predatory bundle inclusion, a problem protocols like CowSwap solve with solvers but at the cost of abstraction.

Evidence: The mempool remains a critical vulnerability. Encrypted mempools like Flashbots Protect are not universally adopted. A user's plaintext bundle intent in a public mempool is a target for front-running and extraction, negating the promised control.

risk-analysis
USER-CONTROLLED BUNDLING PITFALLS

Risk Analysis: What Could Go Wrong?

Decentralizing MEV capture shifts risk vectors from validators to users and new intermediaries.

01

Solver Cartels & Centralization

The competitive landscape for executing user bundles could consolidate into a few dominant solver entities, recreating the extractive MEV supply chain. This risks censorship and front-running by the new middlemen.

  • Risk: A few entities like CowSwap solvers or UniswapX fillers could control >60% of bundle flow.
  • Consequence: Users trade validator MEV for solver MEV, with less transparency.
>60%
Flow Control Risk
New Oligopoly
Market Structure
02

Bundle Complexity & User Error

Users signing complex, conditional transaction bundles introduces massive signature phishing and logic flaw risks. A malicious bundle can appear legitimate but drain assets.

  • Risk: ~$1B+ in crypto losses annually from phishing; bundles are a new attack vector.
  • Consequence: Widespread adoption requires idiot-proof UX, which doesn't exist yet.
$1B+
Annual Phishing Losses
Critical
UX Failure Risk
03

Regulatory Attack Surface

Explicitly defining and selling "transaction order flow" turns a cryptographic abstraction into a clear financial product. This attracts SEC scrutiny as a potential securities-based swap or broker-dealer activity.

  • Risk: Protocols like Across or SUAVE could be targeted for facilitating order flow auctions.
  • Consequence: Compliance burdens kill decentralization, pushing activity to opaque, offshore solvers.
High
SEC Scrutiny Risk
Offshore Shift
Likely Outcome
04

Cross-Chain Bundle Atomicity Failures

User bundles spanning multiple chains via LayerZero or Chainlink CCIP introduce cross-chain settlement risk. A partial execution leaves users with stranded assets or unfavorable positions.

  • Risk: Bridge delays or failures break atomicity, a problem Across solves with optimistic verification but at a latency cost.
  • Consequence: Users bear the liquidation risk from ~2-20 minute cross-chain latency, not the solver.
2-20 min
Settlement Latency
User-Borne
Liquidation Risk
05

Economic Abstraction Erosion

Paying solvers in any token (via ERC-20 payments) undermines the base chain's native token security model. If block builders/solvers don't need ETH, Ethereum's staking economic security weakens.

  • Risk: Proposer-Builder Separation (PBS) assumes ETH is the fundamental medium of exchange.
  • Consequence: Long-term, this could decouple chain security from its fee market, a fundamental flaw.
Core Model
Security Erosion
PBS Assumption
Broken
06

The Oracle Manipulation Endgame

Conditional bundles that depend on oracle prices (e.g., "swap if price > X") create a massive new demand for oracle manipulation. Solvers become incentivized to attack Chainlink or Pyth to trigger profitable bundles.

  • Risk: Concentrates ~$30B+ in DeFi TVL that relies on oracles into a single exploit target.
  • Consequence: The economic incentive to corrupt oracles could outweigh the cost of attack.
$30B+
TVL at Risk
Incentive Misalignment
Solver vs. Network
future-outlook
USER-CONTROLLED EXECUTION

Future Outlook: The Sovereign Execution Layer

The future of MEV is user-controlled transaction bundling, shifting execution power from searchers to wallets and dApps.

User sovereignty replaces extractive searchers. The current MEV supply chain relies on third-party searchers who capture value. The next evolution moves bundling logic into the user's client, enabling wallets like Rabby or MetaMask to construct and submit their own optimized transaction bundles directly to block builders.

Wallets become execution orchestrators. This transforms wallets from simple signers into intent-aware execution engines. They will integrate with services like UniswapX and CowSwap to source quotes, use private mempools like Flashbots Protect, and route transactions across chains via Across or LayerZero based on optimal execution cost.

The standard is ERC-4337 Account Abstraction. This protocol provides the technical substrate for user-controlled bundling. It allows a 'bundler' role, which a user's own client can fulfill, to atomically execute a complex operation. This eliminates the need for a profit-seeking intermediary searcher in the flow.

Evidence: Adoption drives infrastructure. The rise of intent-based architectures in protocols like UniswapX and Across proves the demand for abstracted execution. As ERC-4337 wallet adoption grows, the economic incentive to build client-side bundling tooling becomes unavoidable.

takeaways
THE FUTURE OF MEV

Key Takeaways

The next evolution of MEV shifts control from searchers to users, transforming transaction execution from a hidden tax into a transparent, user-owned asset.

01

The Problem: Opaque Searcher Cartels

Today, a small group of sophisticated searchers and builders capture ~$1B+ annually in MEV, extracting value from users through front-running and sandwich attacks.\n- Centralized Control: Top 5 builders control ~80% of Ethereum blocks.\n- Hidden Tax: Users pay an estimated 5-20% more on DEX swaps due to MEV.

~80%
Block Control
$1B+
Annual Extract
02

The Solution: User-Sourced Bundles (USBs)

Users cryptographically sign bundles of their own transactions, allowing them to capture and sell their own MEV. This flips the economic model.\n- Direct Monetization: Users can sell their transaction flow rights to competing builders.\n- Intent-Based Future: Aligns with UniswapX and CowSwap models, where users express outcomes, not steps.

User-Owned
MEV Rights
0%
Searcher Tax
03

The Enabler: SUAVE as a Shared Mempool

Flashbots' SUAVE aims to be a decentralized, cross-chain block builder and mempool. It provides the neutral infrastructure for User-Sourced Bundles to compete.\n- Cross-Chain Execution: Enables MEV capture across Ethereum, Arbitrum, Optimism.\n- Credible Neutrality: Decentralized sequencer and validator set prevents a single entity from dominating the flow.

Cross-Chain
Scope
Decentralized
Builder
04

The Hurdle: Privacy-Preserving Execution

Revealing a transaction bundle for bidding exposes its strategy. Practical USBs require cryptographic privacy like threshold encryption, as pioneered by Shutter Network.\n- Front-running Risk: Without encryption, the highest bidder can still exploit the user's intent.\n- Latency Trade-off: Adding encryption layers increases latency, challenging ~12s block times.

Critical
For Adoption
~12s
Latency Budget
05

The Competitor: Intents & Solver Networks

User-Sourced Bundles compete with the intent-based paradigm, where users outsource transaction construction entirely to solvers (e.g., UniswapX, Across).\n- User Experience: Intents are simpler ("get me the best price") vs. USBs requiring more user savvy.\n- Efficiency: Solvers can perform cross-domain optimization that a single user's bundle cannot.

Simpler UX
Intents Win
Cross-Domain
Solver Edge
06

The Endgame: MEV as a User Yield Source

The logical conclusion is MEV becoming a predictable, claimable yield stream for everyday users, integrated directly into wallets like MetaMask or Rabby.\n- Automated Auctions: Wallets auto-bundle and auction your transaction flow in the background.\n- New Primitive: "MEV-Protected" becomes a standard wallet setting, like "Private Relay".

User Yield
New Primitive
Wallet-Native
Integration
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
User-Controlled Bundling: The End of Extractive MEV | ChainScore Blog