Relays enforce private policy. Builders submit blocks to relays like BloXroute and Flashbots Protect, which apply censorship lists and transaction filtering before forwarding to validators. This creates a policy gate outside the protocol.
MEV Relays Enforce Policy Without Governance
The Merge handed block production to validators, but MEV relays now control transaction inclusion. This analysis explores how off-chain infrastructure enforces de facto policy, creating a new, ungoverned layer of network control.
The Silent Coup of Block Building
MEV relays have become the de facto policy layer for blockchains, bypassing formal governance to enforce censorship and transaction ordering rules.
Governance is irrelevant. A DAO vote on transaction inclusion is meaningless if every major relay rejects the block. The real governance happens in the relay's config file, not on-chain.
This creates systemic fragility. Relays like Titan Builder and Manifold act as centralized chokepoints. Their failure or collusion can halt the chain, as seen in the OFAC compliance shift post-Tornado Cash sanctions.
Evidence: Over 90% of Ethereum blocks flow through relays. The proposer-builder separation (PBS) framework codified this power shift, making the builder-relay nexus the chain's operational core.
The New Policy Stack: How Relays Rule
MEV relays are becoming the de facto policy layer, enforcing rules at the network level without the overhead of on-chain governance.
The Problem: Governance is a Bottleneck
On-chain governance is slow, politically toxic, and fails at real-time threat response. A protocol-level vote cannot stop a $50M exploit in progress. This creates a critical gap between policy intent and execution.
- Speed Gap: Governance proposals take days; attacks happen in seconds.
- Coordination Failure: Voter apathy and low turnout make decisive action impossible.
- Rigid Rules: Hard-coded parameters cannot adapt to novel attack vectors.
The Solution: Programmable Relays as Policy Engine
Relays like BloXroute, Flashbots Protect, and Eden inspect and filter transactions before they hit the public mempool. They execute policy by censoring malicious bundles and enforcing fair ordering rules in real-time.
- Real-Time Enforcement: Block invalid transactions before they are proposed.
- Dynamic Rulesets: Update filtering logic without a hard fork or vote.
- Network-Level Control: Policy applies to all users, creating a uniform security floor.
Case Study: OFAC Compliance by Default
Post-Merge, major Ethereum relays began filtering OFAC-sanctioned addresses, enforcing regulatory compliance at the infrastructure layer. This was not a protocol decision but a relay operator policy, demonstrating their power.
- No Consensus Needed: Implemented unilaterally by relay operators.
- Immediate Effect: Compliance enforced on ~80% of blocks at its peak.
- The New Reality: Infrastructure dictates de facto network policy, for better or worse.
The Risk: Centralized Points of Control
Relay-based policy creates trust dependencies on a handful of entities. If three major relays collude, they can censor or extract value from the entire chain. This recreates the centralized intermediaries crypto aimed to dismantle.
- Trust Assumption: Users must trust relay operators' code and intentions.
- Cartel Risk: Opaque auction mechanics and lack of slashing enable collusion.
- Protocol Capture: Core development can become beholden to relay interests.
The Counter-Movement: SUAVE & Decentralized Relays
Initiatives like Flashbots' SUAVE aim to decentralize the relay itself, making policy a transparent, programmable marketplace. This shifts control from operators to a network of executors and searchers.
- Modular Design: Separates policy (preferences) from execution (building blocks).
- Credible Neutrality: No single entity controls the transaction funnel.
- Composable Rules: Users and apps can define their own routing and privacy policies.
The Endgame: Relays as the New Kernel
The relay is evolving into the kernel of the blockchain OS—the privileged layer where security, privacy, and economic policy are enforced. The battle for the future of decentralized networks will be fought here, not in governance forums.
- Policy Supremacy: Relay rules can override or nullify on-chain governance.
- Vertical Integration: Expect relays to bundle RPC, sequencing, and bridging.
- Strategic Asset: Controlling relay infrastructure is the new moat for L1s and L2s.
Relay Market Share & Policy Enforcement (Q1 2024)
Comparison of dominant MEV-Boost relays by market share, censorship resistance, and their autonomous policy enforcement mechanisms.
| Feature / Metric | Ultra Sound Relay | Agnostic Relay | Flashbots Relay |
|---|---|---|---|
Q1 2024 Market Share | ~45% | ~25% | ~15% |
Enforces OFAC Sanctions List | |||
Includes Non-Censoring Builder (e.g., rsync) | |||
Maximum Block Bid Inclusion Time | 8 seconds | 7 seconds | 12 seconds |
Publicly Auditable Policy Logs | |||
Requires Builder KYC/Reputation | |||
Avg. Payment to Proposer (Last 30d) | 0.11 ETH | 0.10 ETH | 0.08 ETH |
Supports MEV-Share / Orderflow Auctions |
From Neutral Infrastructure to Policy Engine
MEV relays are evolving from passive data pipes into active policy engines that enforce rules without on-chain governance.
Relays enforce policy directly. A relay's inclusion list is a censorship-resistant policy tool. It filters transactions based on pre-defined rules, not subjective governance votes, enabling instant enforcement of network-level decisions like OFAC compliance or protocol-specific logic.
This bypasses governance bottlenecks. On-chain governance is slow and politically contentious. A relay's policy engine acts unilaterally, allowing protocols like Flashbots Protect or BloXroute to implement changes—like blocking sandwich attacks—without waiting for token-holder consensus.
Policy becomes a competitive feature. Relays differentiate by their rule-sets. Users choose a relay based on its policy, not just its latency. This creates a market for MEV policy as a service, where specialized relays cater to specific applications or regulatory environments.
Evidence: The Ethereum PBS ecosystem demonstrates this shift. Builders like Titan Builder and rsync compete on both performance and the sophistication of their local transaction ordering policies, which directly shape chain outcomes.
The Bear Case: Centralization Vectors
The infrastructure for block building and propagation has become a critical, ungoverned chokepoint for censorship and value extraction.
The Opaque Censorship Filter
Relays like BloXroute and Flashbots Protect run proprietary, black-box transaction filtering logic. This creates a single point of failure for OFAC compliance, allowing relays to silently drop transactions without on-chain accountability.\n- No on-chain slashing for relay misbehavior.\n- ~90%+ of Ethereum blocks are built via a handful of major relays.
The Builder Monopoly Risk
The separation of proposer-builder (PBS) has concentrated block-building power. Entities like Jito Labs and Titan Builder dominate, creating a cartel that can collude to extract maximal MEV and set fees. This undermines the credibly neutral base layer.\n- Top 5 builders control ~80% of blocks.\n- Creates proposer dependency on a few centralized services.
The Governance Bypass
Relay and builder policy changes (e.g., new OFAC lists, fee structures) are enacted off-chain, bypassing Ethereum's social consensus and DAO governance of applications like Uniswap or Aave. This makes protocol-level anti-censorship efforts irrelevant.\n- Unilateral policy shifts possible overnight.\n- Renders Lido's dual governance and similar models ineffective against relay-level censorship.
The Data Advantage Feedback Loop
Dominant relays and builders aggregate vast amounts of real-time transaction flow and MEV opportunity data. This creates an insurmountable information asymmetry versus smaller players, entrenching their position and stifling competition.\n- Private mempools like Flashbots Suave centralize intent data.\n- Leads to latency arms races and infrastructure centralization.
The Path Forward: Enshrined vs. Entrenched
MEV relays are becoming the de facto policy layer for blockchains, enforcing rules without formal governance.
Relays enforce policy directly. They are the execution layer for validator selection rules, censorship resistance, and builder reputation. This bypasses slow, politicized on-chain governance processes like those in MakerDAO or Compound.
Enshrined logic beats on-chain votes. A relay's code is a faster, more deterministic policy engine than a DAO. This creates a protocol-level separation of powers where governance sets intent and relays execute it.
This creates systemic risk. Centralized relay operators like BloXroute and Blocknative become critical, ungovernable infrastructure. Their failure or capture compromises the entire chain's liveness and neutrality.
Evidence: Ethereum's PBS relies on a handful of dominant relays. Their consistent enforcement of OFAC compliance lists demonstrates this policy power in action, irrespective of community sentiment.
TL;DR for Protocol Architects
MEV relays are evolving from simple auction houses to programmable policy engines, enabling protocol-level rule enforcement without on-chain governance overhead.
The Problem: Governance is Too Slow for MEV
On-chain governance votes to blacklist a malicious searcher or adjust auction parameters take days. By then, the damage is done and the exploit is over. This creates a critical security gap where the most time-sensitive decisions are the slowest to make.
- Latency Gap: Governance lags (~7 days) vs. exploit execution (~1 block)
- Reactive, Not Proactive: Rules are updated after attacks, not before
- Voter Apathy: Complex MEV policy rarely gets sufficient voter turnout
The Solution: Programmable Relay as Policy Layer
Relays like Flashbots Suave and BloXroute are becoming execution environments that validate transactions against a protocol's rulebook before forwarding them to builders. The relay acts as a trust-minimized, high-speed bouncer.
- Real-Time Enforcement: Rules are applied at the millisecond level, pre-block.
- Off-Chain Logic: Complex policies (e.g., capping sandwich profit, whitelisting DEXs) run off-chain.
- Credible Neutrality: Relays commit to the public rulebook, making censorship verifiable.
Architectural Primitive: Intent-Based Flow Control
This turns the relay into a flow controller for user intents, similar to how UniswapX and CowSwap work on L1. The relay ensures only transactions fulfilling a specific intent schema (e.g., "arbitrage only", "no front-running") are passed through.
- Schema Validation: Relay validates transaction purpose against allowed patterns.
- Builder Accountability: Non-compliant blocks from builders can be rejected by the relay network.
- Protocol Sovereignty: Each app chain or rollup can deploy its own relay policy, creating a modular MEV firewall.
Entity in Action: Flashbots Suave
Suave is the canonical example, architecting the relay, block builder, and user preference chain as separate, specialized components. Its pre-confirmation design inherently enforces user-specified constraints before execution.
- Centralized Enforcer, Decentralized Future: Starts as a trusted policy engine, with a roadmap to decentralized validator sets.
- Kills Multiple Birds: Addresses censorship, MEV extraction, and user fairness in one stack.
- New Revenue Model: Relays earn fees for policy enforcement, not just block space allocation.
The Risk: Relay Capture and Centralization
Consolidating policy power in a few relay operators creates a massive centralization vector. If three relays enforce 90% of blockspace, they become de facto governors. The technical challenge is distributing this policy enforcement without reintroducing latency.
- Single Point of Failure: A compromised or malicious relay can censor entire sectors of activity.
- Cartel Formation: Dominant relays could collude to extract value or set unfavorable policies.
- Verification Gap: Proving a relay correctly followed its own rules requires robust attestation protocols.
Implementation Checklist for Architects
- Define Policy Spec: Codify exact rules (max slippage, allowed contracts, profit thresholds) in a machine-readable format.
- Select Relay Partner: Choose a relay with programmable infrastructure (e.g., Suave, bloXroute, EigenLayer-based AVS).
- Design Attestation: How will you verify the relay followed the rules? Use Ethereum attestations or zk-proofs.
- Plan Decentralization Path: Start with a trusted enforcer, but have a clear roadmap to a decentralized validator set or multi-relay network.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.