Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

MEV (Maximal Extractable Value)

MEV (Maximal Extractable Value) is the profit miners or validators can extract by reordering, including, or censoring transactions within a block.
Chainscore © 2026
definition
BLOCKCHAIN ECONOMICS

What is MEV (Maximal Extractable Value)?

MEV is a fundamental economic force in blockchain networks, representing the total value that can be extracted from block production beyond standard block rewards and gas fees.

Maximal Extractable Value (MEV) is the total profit a block producer (e.g., a miner or validator) can earn by strategically including, excluding, or reordering transactions within a block they create. This value is extracted from the network's users through sophisticated strategies that exploit the inherent latency and transparency of public mempools. MEV is not a protocol feature but an emergent property of permissionless blockchains, where the entity with the right to produce a block has significant discretionary power over its composition.

Common MEV strategies include arbitrage, where a searcher profits from price differences across decentralized exchanges within a single block; liquidations, where a position is closed for a fee when it becomes undercollateralized; and sandwich attacks, where a user's large trade is front-run and back-run to capture value from its price impact. These strategies are typically executed by automated bots that compete in a high-speed, high-stakes environment, paying elevated priority fees (tips) to validators to ensure their profitable transactions are included.

The pursuit of MEV has significant negative externalities, including network congestion, inflated gas prices for regular users, and potential chain instability. In response, the ecosystem has developed mitigation techniques like Flashbots, which create private channels (dark pools) for transaction submission to reduce predatory front-running. Furthermore, Proposer-Builder Separation (PBS) architectures aim to decentralize MEV capture by separating the roles of block building and block proposal, a design central to Ethereum's roadmap.

etymology
TERMINOLOGY EVOLUTION

Etymology: From MEV to Maximal Extractable Value

The term MEV has undergone a significant semantic shift, reflecting a more precise understanding of its economic nature and scope within blockchain ecosystems.

Maximal Extractable Value (MEV) is the total value that can be extracted from block production on a blockchain through the inclusion, exclusion, or reordering of transactions, beyond standard block rewards and gas fees. This value arises from inefficiencies and arbitrage opportunities present in decentralized systems, such as price differences across decentralized exchanges (DEXs) or the ability to front-run pending transactions. The term evolved from its original acronym, Miner Extractable Value, which specifically referenced proof-of-work (PoW) networks where miners controlled transaction ordering. With the rise of proof-of-stake (PoS) and other consensus mechanisms, the more inclusive term Maximal was adopted to encompass validators, sequencers, and other block producers.

The shift from Miner to Maximal was not merely semantic but reflected a critical conceptual broadening. It acknowledged that the economic activity was not inherently tied to the mining process itself but was a fundamental property of permissionless, transparent mempools and decentralized finance (DeFi) composability. This reframing highlighted that MEV is a systemic design space with both negative externalities—like network congestion and unfair user experiences—and potential benefits, such as providing liquidity and improving price efficiency through arbitrage. The new terminology also correctly positions the value as the theoretical maximum, recognizing that in practice, extracted value is often competed away in a complex ecosystem of searchers, builders, and validators.

Understanding this etymology is crucial for developers and analysts, as it underscores the pervasive and protocol-agnostic nature of the phenomenon. MEV exists wherever transaction ordering is probabilistic and valuable information is publicly visible before finalization. Consequently, research and solutions—such as proposer-builder separation (PBS), encrypted mempools, and fair ordering protocols—are designed to mitigate its negative impacts or redistribute its proceeds more equitably, regardless of the underlying consensus mechanism. The term's evolution mirrors the blockchain industry's maturation in analyzing its own economic foundations.

how-it-works
MECHANICS

How MEV Works: The Mechanics of Extraction

This section details the technical processes and economic incentives that enable Maximal Extractable Value (MEV) extraction on blockchain networks.

Maximal Extractable Value (MEV) is the total value that can be extracted from block production on a blockchain by including, excluding, or reordering transactions within a block. This value arises from the inherent discretion granted to validators or miners who assemble blocks, allowing them to profit from arbitrage opportunities, liquidations, and other strategic transaction ordering that is not available to regular users. The core mechanic is the mempool, a public waiting area for pending transactions, which searchers analyze to identify profitable opportunities.

The extraction process typically involves three key actors: searchers, builders, and proposers. Searchers are sophisticated bots that run complex algorithms to scan the mempool for profitable MEV opportunities, such as DEX arbitrage or liquidations. They then create bundles of transactions designed to capture this value. These bundles are sent to block builders, specialized entities that compete to construct the most profitable block possible by optimally ordering transactions and bundles. The winning builder's block is then proposed to the network by the block proposer (validator).

The dominant infrastructure for MEV extraction on Ethereum is the proposer-builder separation (PBS) model facilitated by MEV-Boost. This relay network allows proposers to outsource block building to a competitive marketplace. Builders submit their complete block headers (including a bid) to relays, which then forward the highest-bidding header to the proposer. The proposer simply signs and publishes the most profitable header, receiving the bid as payment, while the builder's full block is revealed upon publication. This separates the power to choose transactions (building) from the power to finalize the block (proposing).

Common MEV strategies include DEX arbitrage, which exploits price differences between decentralized exchanges within a single block, and liquidations, where a searcher repays a user's undercollateralized loan to claim a liquidation fee. More complex forms include sandwich attacks, where a searcher places transactions before and after a victim's large trade to profit from the resulting price movement. These activities are executed via flashbots bundles or similar private transaction channels to prevent frontrunning by other searchers.

The impact of MEV is dual-sided: while it contributes to network security by increasing validator rewards, it also creates negative externalities like network congestion and increased transaction costs for regular users. It can lead to reorgs (chain reorganizations) as validators may attempt to re-mine blocks to capture MEV. In response, solutions like MEV smoothing, encrypted mempools, and fair ordering protocols are being developed to mitigate its harmful effects and redistribute extracted value more equitably across the network.

key-features
MECHANICS AND IMPLICATIONS

Key Features of MEV

Maximal Extractable Value (MEV) refers to the profit that can be extracted by reordering, inserting, or censoring transactions within blocks. This glossary defines its core mechanisms and ecosystem.

01

Frontrunning

The practice of placing a transaction with higher gas fees to execute before a known pending transaction, profiting from the price impact of the original trade. This is a classic form of arbitrage and often targets large DEX swaps.

  • Example: A bot sees a large buy order for an asset on a DEX and submits its own buy order with a higher gas price to purchase the asset first, then sells it to the original trader at a higher price.
02

Backrunning

Submitting a transaction to execute immediately after a known transaction, capitalizing on the state change it creates. This is common with liquidation events or large DEX trades that create predictable arbitrage opportunities.

  • Example: After a large trade creates a price discrepancy between two DEXs, a bot executes an arbitrage trade to profit from the imbalance before the market corrects.
03

Sandwich Attack

A specific, two-transaction attack that frontruns a victim's DEX trade and backruns it, trapping the victim's transaction in the middle. The attacker profits from the artificial slippage they create.

  • Process: 1. Frontrun: Buy the asset the victim wants. 2. Victim's trade executes at a worse price due to the attacker's buy. 3. Backrun: Sell the asset back to the market at the inflated price.
04

Time-Bandit Attacks

A class of attacks where validators or miners attempt to reorganize the blockchain (reorg) to extract value from past blocks. This undermines blockchain finality and is considered highly disruptive.

  • Mechanism: A validator withholds a newly mined block, observes the content of the canonical chain, and then attempts to mine an alternative chain that includes more profitable transactions, causing a reorg if successful.
common-strategies
MECHANISMS

Common MEV Extraction Strategies

MEV extraction strategies are specific techniques used by searchers and validators to capture value from transaction ordering and block production.

01

Frontrunning

A searcher observes a pending transaction in the mempool and submits their own transaction with a higher gas fee to execute first, profiting from the price impact of the original trade. This is the most basic form of arbitrage and sandwich trading often begins with this step.

02

Sandwich Trading

A sophisticated form of frontrunning that places one transaction before and one after a target victim transaction. The attacker:

  • Buys the asset before the victim's large buy.
  • Lets the victim's trade execute, pushing the price up.
  • Sells the now more valuable asset immediately after, profiting from the inflated price. This creates negative slippage for the victim.
03

Arbitrage

Exploiting price differences for the same asset across different decentralized exchanges (DEXs) or liquidity pools. A searcher's bot detects the discrepancy and executes a buy on the lower-priced venue and a simultaneous sell on the higher-priced one, capturing the spread. This is often considered beneficial MEV as it helps correct market inefficiencies.

04

Liquidations

In lending protocols like Aave or Compound, undercollateralized positions can be liquidated for a bonus. Searchers compete to be the first to supply the transaction that repays the debt and seizes the collateral, earning a liquidation fee. This is a critical, protocol-sanctioned form of MEV that maintains system solvency.

05

Time-Bandit Attacks

A consensus-level attack where a validator or coalition of validators intentionally reorganizes the blockchain (reorg) to revert a block containing profitable MEV and capture it for themselves. This undermines blockchain finality and is considered one of the most damaging forms of MEV extraction.

06

Long-Tail Extraction

Targeting less obvious opportunities beyond DEXs, such as:

  • NFT floor price arbitrage across markets.
  • Bridge arbitrage between different chains.
  • Exploiting governance proposal outcomes.
  • Oracle price manipulation attacks. These strategies require deep protocol-specific knowledge.
ecosystem-usage
MECHANISMS AND ACTORS

MEV in the Ecosystem

Maximal Extractable Value (MEV) is not a single action but an ecosystem of strategies, roles, and infrastructure that has emerged to identify, extract, and redistribute value from blockchain transaction ordering.

03

Proposer (Validator)

The proposer (or validator) is the entity chosen to propose the next block. Their role in MEV is to:

  • Select the most profitable block header submitted by builders.
  • In a naive system, they could directly manipulate transaction order. With PBS, their influence is reduced to choosing between pre-built blocks.
  • Earn the block reward and any priority fees included by the builder.
04

Relays

A relay is a trusted intermediary in the Proposer-Builder Separation (PBS) pipeline. It acts as a neutral party to:

  • Receive full block contents from builders.
  • Verify block validity (e.g., no invalid transactions).
  • Pass only the block header to proposers, preventing them from stealing the block's content. Major relays include Flashbots SUAVE, BloXroute, and Agnostic.
05

Common Extraction Strategies

MEV is extracted through specific on-chain strategies:

  • Arbitrage: Exploiting price differences for the same asset across different DEXs within a single block.
  • Liquidation: Triggering the liquidation of an undercollateralized loan and claiming the liquidation fee.
  • Sandwich Trading: A malicious form of front-running where a searcher places orders before and after a victim's large trade to profit from the induced price movement.
security-considerations
MEV (MAXIMAL EXTRACTABLE VALUE)

Security Considerations & Risks

MEV refers to the profit that can be extracted by reordering, inserting, or censoring transactions within a block. While a core economic mechanism, it introduces significant security and fairness risks to blockchain networks.

02

Time-Bandit Attacks & Chain Reorganizations

This is a consensus-level risk where validators are incentivized to re-mine or reorg past blocks to capture MEV that was missed. A validator might discard a canonical chain to create a new fork where they include profitable transactions for themselves.

  • Impact: Undermines finality, creates network instability, and can lead to double-spending if exploited maliciously. It represents a fundamental tension between profit maximization and chain security.
03

Censorship

Validators or block builders can censor transactions by excluding them from blocks entirely. This can be for profit (to prevent competing arbitrage) or for regulatory/political reasons.

  • Impact: Violates permissionlessness and neutrality, a core tenet of decentralized networks. Users or applications can be denied access to the ledger. Proposer-Builder Separation (PBS) architectures aim to mitigate this by separating the roles of block building and proposing.
04

Centralization Pressure

The high-stakes competition for MEV creates economies of scale, favoring sophisticated, well-capitalized players. This leads to:

  • Relay & Builder Centralization: A few dominant entities control the flow of blocks to validators.
  • Validator Centralization: Entities with advanced MEV extraction capabilities earn more, allowing them to stake more ETH and increase their influence.
  • Impact: Concentrates power, reducing network resilience and increasing systemic risk from collusion or coordinated failure.
05

Economic Inefficiency & Negative Externalities

MEV extraction is often a zero-sum or negative-sum game for the broader ecosystem. Value extracted by searchers and validators is frequently wealth transferred from regular users.

  • Gas Auction Waste: Searchers engage in Priority Gas Auctions (PGAs), bidding up base fee costs, which are burned or paid to validators, providing no direct utility.
  • Network Congestion: MEV-related transactions can flood the mempool, increasing latency and costs for all users.
COMPARISON

MEV Mitigation & Redistribution Solutions

A comparison of architectural approaches to mitigate the negative externalities of MEV and redistribute captured value.

MechanismProposer-Builder Separation (PBS)Encrypted MempoolsFair Ordering / Time-BoostMEV Redistribution (e.g., MEV-Burn/Smoothing)

Core Principle

Separates block building from proposing via a competitive auction

Encrypts transactions until they are included in a block

Orders transactions based on submission time or a fairness metric

Redistributes or destroys MEV revenue extracted from a block

Primary Goal

Transparent auction for block space, reducing centralization

Prevent frontrunning by hiding transaction intent

Enforce a canonical, fair transaction order

Socialize MEV gains or remove them from the validator set

MEV Mitigation Strength

Medium (shifts, doesn't eliminate, MEV competition)

High (against public frontrunning)

Medium-High (against timing-based attacks)

Low (mitigates effects, not extraction)

Redistribution Mechanism

To the block proposer via auction bids

N/A (focus is on prevention)

N/A (focus is on prevention)

To all validators (smoothing) or burned (MEV-Burn)

Implementation Complexity

High (requires protocol changes)

High (cryptography, latency trade-offs)

Medium (consensus layer changes)

Medium (consensus or protocol rules)

Live Examples / Proposals

Ethereum PBS (in-protocol), MEV-Boost (out-of-protocol)

Shutterized rollups, SUAVE

Aptos BFT, Solana proof-of-history influence

Ethereum MEV-Burn proposal, Cosmos Skip Protocol

Key Trade-off

Centralizes block building to specialized searchers/builders

Increases latency, potential for collusion

May reduce chain throughput and efficiency

Reduces validator incentives, requires accurate MEV measurement

FAQ

Common Misconceptions About MEV

Maximal Extractable Value (MEV) is a complex and often misunderstood force within blockchain ecosystems. This section clarifies frequent points of confusion regarding its nature, impact, and the solutions being developed.

No, MEV is not the same as standard block reward or transaction fee revenue. Maximal Extractable Value (MEV) refers to the additional profit that can be extracted by reordering, including, or censoring transactions within a block, beyond the standard gas fees. While miners or validators capture this value, it originates from arbitrage opportunities, liquidations, and other on-chain strategies, making it a distinct economic phenomenon from the base protocol issuance.

MAXIMAL EXTRACTABLE VALUE

Frequently Asked Questions (FAQ)

Essential questions and answers about MEV, the value extracted by reordering, including, or censoring transactions within blocks.

Maximal Extractable Value (MEV) is the maximum profit that can be extracted by a block producer (e.g., a validator or miner) by manipulating the order, inclusion, or censorship of transactions within a block, beyond the standard block reward and gas fees. It works by exploiting the ability to view the pending transaction pool (mempool) and strategically reordering transactions to capture arbitrage opportunities, liquidate positions, or front-run user trades. For example, a searcher might spot a profitable DEX arbitrage opportunity and pay a high priority fee (tip) to ensure their transaction is placed right after the target trade, capturing the price difference.

further-reading
MEV (MAXIMAL EXTRACTABLE VALUE)

Further Reading & Research

MEV is a fundamental force in blockchain economics, representing the profit miners or validators can extract by reordering, including, or censoring transactions within a block. Explore its core mechanisms, key players, and mitigation strategies.

01

Frontrunning & Sandwich Attacks

Frontrunning is the practice of placing a transaction ahead of a known pending transaction to profit from its anticipated price impact. A sandwich attack is a specific, common form where an attacker places one transaction before and one after a target victim's large trade, profiting from the artificial price movement they create.

  • Example: Seeing a large DEX swap for ETH, a searcher submits their own buy order with a higher gas fee to execute first, then sells into the victim's trade.
02

Arbitrage & Liquidations

These are often considered "good" or "non-harmful" MEV, as they correct market inefficiencies or enforce protocol rules.

  • Arbitrage: Exploiting price differences for the same asset (e.g., ETH) across different decentralized exchanges (DEXs) like Uniswap and SushiSwap.
  • Liquidations: Triggering the forced closure of undercollateralized loans in protocols like Aave or MakerDAO to collect a liquidation bonus, keeping the system solvent.
03

Searchers & Builders

The MEV supply chain consists of specialized actors:

  • Searchers: Bots that scan the mempool and simulate transactions to identify profitable MEV opportunities. They create bundles of transactions.
  • Builders: Specialized block builders that compete to construct the most profitable block by optimizing transaction order and including searcher bundles. They submit complete block proposals to validators.
04

Proposer-Builder Separation (PBS)

A critical design pattern (central to Ethereum's roadmap) that separates the roles of block builder and block proposer (validator).

  • Goal: Prevent validators from exploiting their positional monopoly and centralize MEV extraction complexity to professional builders.
  • Mechanism: Builders bid in an auction for the right to have their block proposal signed by the winning validator. This creates a competitive market for block space.
06

MEV Mitigation & Fair Ordering

Protocols and techniques designed to reduce harmful MEV:

  • Commit-Reveal Schemes: Users submit encrypted transactions first, revealing them only after they are committed, preventing frontrunning.
  • Fair Sequencing Services (FSS): Attempts to define a canonical, fair order for transactions (e.g., based on receipt time) rather than gas price.
  • Threshold Encryption: Used by protocols like CowSwap to batch orders and settle them in a single batch, eliminating frontrunning opportunities within the batch.
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline
MEV (Maximal Extractable Value) - Blockchain Glossary | ChainScore Glossary