Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

MEV Extraction (Miner Extractable Value)

MEV Extraction is the profit miners or validators can extract by strategically reordering, censoring, or inserting transactions within a block they produce.
Chainscore © 2026
definition
BLOCKCHAIN MECHANISM

What is MEV Extraction (Miner Extractable Value)?

MEV Extraction refers to the process by which network participants profit by strategically ordering, including, or censoring transactions within a block.

MEV Extraction is the practice of capturing value by manipulating the order of transactions in a block. Originally called Miner Extractable Value, as miners on Proof-of-Work chains controlled block production, the term now broadly applies to validators, sequencers, and specialized bots on any blockchain. This value exists because block producers can reorder, insert, or exclude pending transactions to their financial advantage, extracting profit that would otherwise go to ordinary users. The most common forms include front-running, back-running, and sandwich attacks against decentralized exchange trades.

The primary sources of extractable value are arbitrage opportunities and liquidations. For example, a large trade on a DEX can move the price of an asset, creating a profitable arbitrage opportunity on another exchange. A searcher's bot can detect this pending trade, pay a higher priority fee (gas) to have its own arbitrage transaction placed immediately before or after it, and capture the price difference. Similarly, bots can trigger and profit from undercollateralized loan liquidations in lending protocols like Aave or Compound by being the first to supply the liquidation transaction.

MEV extraction has significant implications for network health and user experience. It can lead to network congestion and inflated transaction fees as bots engage in bidding wars for block space. For users, it results in worse execution prices (slippage) and can feel like a hidden tax. The ecosystem has developed both permissionless solutions like Flashbots' MEV-Boost, which creates a transparent auction for block space, and protocol-level mitigations such as CowSwap's batch auctions or Chainlink's Fair Sequencing Services, which aim to reduce the profitability and negative externalities of MEV extraction.

etymology
TERM ORIGIN

Etymology and Origin

The term MEV, or Miner Extractable Value, originated from the specific economic dynamics of Proof-of-Work blockchains, where miners held the exclusive power to order transactions.

The term Miner Extractable Value (MEV) was coined in a 2019 paper by Phil Daian and colleagues titled 'Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges'. It precisely described the profit a Proof-of-Work miner could extract by strategically including, excluding, or reordering transactions within a block they produced. This power stemmed from the miner's role as the temporary, centralized sequencer for that block, granting them a unique, permissionless view of the pending transaction pool or mempool.

The conceptual foundation for MEV predates its naming. Practices like front-running and back-running observable trades on decentralized exchanges were well-known exploits. The 2019 paper provided a formal, quantifiable framework—extractable value—for this latent revenue, linking it directly to the miner's technical capabilities. This framing highlighted MEV not as a bug, but as an inherent economic property of permissionless blockchains with transparent mempools and decentralized consensus.

With the industry's shift towards Proof-of-Stake, the mechanics remained but the actor changed. Validators, not miners, now perform block production. Consequently, the term evolved to Maximal Extractable Value, a more general label acknowledging that any entity with the right to propose a block (miner, validator, or sequencer) can capture this value. The acronym MEV endured due to its established usage, even as its original "M" now often stands for "Maximal."

The etymology reflects the field's maturation: from identifying a specific miner-centric exploit (Miner Extractable Value) to recognizing a fundamental, systemic design challenge (Maximal Extractable Value). This broader understanding encompasses all forms of value extraction from block space manipulation, including arbitrage, liquidations, and sandwich attacks, regardless of the underlying consensus mechanism.

key-features
MECHANISMS & IMPACTS

Key Features of MEV

Miner Extractable Value (MEV) refers to profit extracted by reordering, inserting, or censoring transactions within a block. These are the primary methods and consequences of its extraction.

01

Arbitrage

The most common form of MEV, where searchers profit from price differences of the same asset across different Decentralized Exchanges (DEXs) or liquidity pools. A searcher spots a mispricing, executes a buy-low, sell-high transaction bundle, and pays a priority fee to a block producer to include it first.

  • Example: Buying ETH on Uniswap where it's cheaper and instantly selling it on SushiSwap where it's more expensive, all within a single atomic transaction.
02

Liquidations

Profit extracted from undercollateralized loans in lending protocols like Aave or Compound. When a loan's collateral value falls below a required threshold, it becomes eligible for liquidation. Searchers run bots to be the first to supply the transaction that repays the borrower's debt and seizes the collateral, receiving a liquidation bonus as a reward.

This activity is considered "good" MEV as it maintains the protocol's solvency.

03

Sandwich Trading

A predatory form of MEV that targets large, visible DEX trades in the mempool. A searcher front-runs the victim's trade by buying the same asset first, causing its price to rise. The victim's trade executes at this worse price, and the searcher then back-runs the victim by selling the asset, profiting from the artificial price movement.

  • Impact: Results in slippage and worse execution for the end-user.
04

Time-Bandit Attacks

A sophisticated and disruptive form of MEV where block producers are incentivized to reorganize the blockchain itself. If a previously mined block contains extremely valuable MEV, a miner might choose to discard it and mine an alternative chain that includes a different transaction ordering to capture that value for themselves.

This undermines blockchain finality and is a significant security concern, particularly for chains with slower block times.

05

Transaction Censorship

The exclusion of specific transactions from a block for profit or compliance. A block producer (e.g., a validator) can ignore transactions from certain addresses or containing specific smart contract calls.

  • Profit Motive: Ignoring transactions that compete with the producer's own arbitrage opportunities.
  • Regulatory Motive: Complying with government sanctions lists.

This challenges the neutrality and permissionless nature of the network.

how-it-works
MECHANISMS

How MEV Extraction Works

MEV extraction is the process by which network participants—validators, searchers, and bots—identify and capture profit opportunities created by the ability to order, include, or censor transactions within a block.

MEV extraction begins with searchers running sophisticated algorithms to scan the mempool (the pool of pending transactions) and the state of decentralized applications. They identify profitable opportunities, such as arbitrage between decentralized exchanges, liquidations in lending protocols, or the placement of transactions in a specific sequence. The searcher then bundles these transactions into a bundle or uses a private transaction relay to submit them to a block builder or validator.

The core of the extraction process relies on a validator's unilateral power over block production. In Proof-of-Stake systems like Ethereum, this is more accurately called Proposer Extractable Value (PEV). Validators or their chosen block builders receive these profitable bundles from searchers. They then construct a block that maximizes their total revenue, which includes both the standard block rewards and the additional MEV. This often involves reordering or inserting transactions to capture the identified value, a practice central to strategies like frontrunning and backrunning.

The extracted value is frequently shared among participants in an MEV supply chain. A searcher who discovers an opportunity may pay a fee (a bid) to a block builder via a relay to have their bundle included. The block builder, after constructing the most profitable block, delivers it to the validator/proposer. The validator then typically receives a portion of the MEV profits as a payment for including that block, often through a practice known as MEV-Boost on Ethereum, which creates a competitive marketplace for block space.

Common extraction techniques include DEX Arbitrage, where a bot profits from price differences across exchanges by buying low on one and selling high on another within the same block. Another is Liquidation, where a searcher triggers the liquidation of an undercollateralized loan to earn a liquidation fee. Sandwich Attacks are a malicious form where a searcher places one transaction before and one after a victim's large trade, profiting from the predictable price impact.

The consequences of MEV extraction are significant. While it can lead to more efficient markets through arbitrage, it also creates negative externalities like network congestion and increased gas fees for regular users. Malicious MEV, such as sandwich attacks, constitutes a direct tax on users. In response, solutions like Flashbots SUAVE, CowSwap's CoW Protocol, and private RPCs aim to democratize access, mitigate harms, or protect users from predatory extraction.

common-techniques
MECHANISMS

Common MEV Extraction Techniques

MEV extraction involves strategically ordering, inserting, or censoring transactions within a block to capture value. These are the primary methods used by searchers and validators.

01

Front-Running

Front-running is the practice of placing a transaction immediately before a known pending transaction to profit from its anticipated market impact. A searcher detects a large pending DEX trade and submits their own buy order with a higher gas fee, ensuring it executes first. When the victim's large trade executes and moves the price, the searcher sells the asset at a profit. This is a form of priority gas auction (PGA) where bots compete to be first in line.

02

Back-Running

Back-running involves placing a transaction immediately after a known pending transaction to capitalize on its state changes. Common after a large DEX trade that creates a predictable arbitrage opportunity between pools, or after a liquidation event on a lending protocol where collateral becomes available at a discount. Unlike front-running, it does not harm the initial trader but profits from the new market conditions they created.

03

Sandwich Attack

A sandwich attack is a combined front-run and back-run against a single victim transaction. The attacker:

  • Front-runs the victim's large trade, buying the asset and driving the price up.
  • The victim's trade executes at the worsened price.
  • The attacker back-runs the victim, selling the asset at the inflated price for a risk-free profit. This extracts value directly from the victim's trade via slippage and is prevalent on automated market maker (AMM) DEXes.
04

Arbitrage

Arbitrage is the simultaneous buying and selling of an asset across different markets to profit from price discrepancies. In MEV, this often involves DEX-to-DEX arbitrage, where a price difference exists between Uniswap and Sushiswap for the same token pair. Searchers run bots to discover these opportunities and submit bundles that execute the buy and sell in a single atomic transaction, capturing the spread. This is generally considered benign MEV as it improves market efficiency.

05

Liquidation

Liquidation MEV involves being the first to trigger the liquidation of an undercollateralized position in a lending protocol (like Aave or Compound). The first liquidator repays part of the debt and receives the borrower's collateral at a discount as a reward. Searchers compete in gas auctions to submit the liquidation transaction first. This is essential for protocol health but can lead to liquidation cascades during market volatility.

06

Time-Bandit Attacks

A time-bandit attack (or reorg attack) is a validator-level attack where a miner or validator intentionally reorganizes the blockchain to extract MEV from past blocks. The validator withholds a newly mined block, observes valuable transactions in the canonical chain, and then mines a competing chain that includes those transactions but in an order beneficial to themselves. This undermines blockchain finality and is considered a severe, malicious form of MEV extraction.

governance-impacts
MECHANICAL ANALYSIS

Impacts on DAO Governance & Voting

Miner Extractable Value (MEV) introduces unique economic and security challenges for decentralized autonomous organizations, influencing voting outcomes, treasury management, and proposal execution.

03

Treasury Management Risks

DAO treasuries holding significant assets are prime targets for MEV extraction. Common risks include:

  • Liquidity Pool Manipulation: Searchers can manipulate oracle prices before a treasury withdrawal.
  • Cross-Chain Bridge Exploits: MEV can be extracted during asset bridging operations approved by governance.
  • Collateral Liquidations: Poorly parameterized lending positions can be triggered for profit.
05

Vote Delegation & Agency Problems

The prevalence of liquid delegation and vote farming exacerbates MEV risks. Delegators may not act in the DAO's long-term interest if they can profit from short-term MEV opportunities triggered by governance actions. This creates a principal-agent problem where delegated voting power is used for extractive, rather than constructive, purposes.

06

Related Concept: Transaction Ordering Dependence (TOD)

At its core, MEV exploits Transaction Ordering Dependence, where the outcome of a transaction changes based on its position in a block. In governance, this means the financial result of executing a proposal is not deterministic—it depends on the surrounding transactions ordered by validators, making DAO operations inherently vulnerable to maximal extractable value.

security-considerations
MEV EXTRACTION

Security Considerations & Risks

Miner Extractable Value (MEV) refers to profit that can be extracted by reordering, censoring, or inserting transactions within a block, posing systemic risks to network fairness and user security.

01

Front-Running

A malicious actor observes a pending transaction (e.g., a large DEX trade) in the mempool and submits their own transaction with a higher gas fee to execute first, profiting from the anticipated price impact. This is the most common form of MEV.

  • Example: A bot sees a large buy order for a token and buys it first, then sells it to the original trader at a higher price.
  • Targets: DEX traders, arbitrage opportunities.
02

Sandwich Attacks

A specialized, damaging form of front-running where an attacker places one transaction before and one after a victim's trade. The first transaction buys the asset, the victim's trade pushes the price up, and the attacker's second transaction sells for a risk-free profit at the victim's expense.

  • Directly extracts value from ordinary users.
  • Increases slippage and transaction costs for everyone.
03

Time-Bandit Attacks

An extreme risk where a miner or validator considers reorganizing the blockchain (a reorg) to capture MEV from a past block. This undermines blockchain finality and consensus security.

  • Rational for a miner if the MEV in a past block exceeds the block reward and penalties.
  • A credible threat to Proof-of-Work and some Proof-of-Stake chains without strong penalties.
04

Censorship

The ability for block producers to exclude certain transactions from blocks entirely. This can be used for profit (e.g., ignoring arbitrage transactions to capture the opportunity themselves) or for regulatory/political reasons.

  • Threatens network neutrality and permissionless access.
  • Can be used in Maximum Extractable Value (MEV) strategies to eliminate competition.
mitigation-solutions
MEV EXTRACTION

Mitigation Strategies & Solutions

A taxonomy of technical and economic mechanisms designed to mitigate the negative externalities of Miner Extractable Value, including front-running, sandwich attacks, and time-bandit attacks.

02

Commit-Reveal Schemes

A cryptographic technique where users submit a commitment (a hash of their transaction and a secret) instead of the full transaction. After a delay, they reveal the full details. This prevents searchers from seeing and front-running the intent until it's too late. While effective, it adds latency and complexity for users. It is commonly used in decentralized exchange auctions and some privacy-preserving applications.

05

MEV Searchers & Bundles

Searchers are independent agents who run complex algorithms to detect and extract MEV opportunities. They submit transaction bundles to builders or validators via private channels (like the Flashbots Relay), which specify that all transactions in the bundle must be included in a block together or not at all. This allows for complex, atomic arbitrage and liquidation strategies while reducing failed transactions and network congestion from public mempool bidding wars.

06

Economic & Protocol-Level Deterrents

Protocol designs that inherently reduce the profitability or feasibility of certain MEV attacks. Examples include:

  • CowSwap's batch auctions with uniform clearing prices, which eliminate sandwich attack profitability.
  • Uniswap V3's concentrated liquidity, which can reduce the impact of large swaps and associated arbitrage.
  • Time-based finality (e.g., Ethereum's single-slot finality roadmap) to deter time-bandit attacks that attempt to reorg chains for profit.
CONSENSUS COMPARISON

MEV in PoW vs. PoS

A comparison of how Miner/Maximal Extractable Value manifests and is extracted under Proof-of-Work and Proof-of-Stake consensus mechanisms.

Feature / CharacteristicProof-of-Work (PoW)Proof-of-Stake (PoS)

Primary Actors

Miners (with hash power)

Validators / Proposers (with staked capital)

Block Production Rights

Probabilistic, via hash rate

Deterministic, via stake-weighted lottery

Extraction Window

From mempool to block finalization

From mempool to block proposal slot

Key Extraction Method

Transaction ordering within a block

Transaction ordering + potential for censorship

Revenue Concentration

High (mining pools)

Potentially higher (staking pools / Lido)

Time Sensitivity

High (competition per block)

Predictable (known proposal schedule)

Primary Risk Vector

Time-bandit attacks

Proposer-Builder Separation (PBS) failure

Post-Merge Ethereum

Not applicable (historical)

The active consensus mechanism

MEV EXTRACTION

Frequently Asked Questions (FAQ)

Miner Extractable Value (MEV) is a fundamental force in blockchain economics, representing profit extracted by reordering, including, or censoring transactions within a block. These FAQs address its mechanisms, impacts, and the evolving solutions.

Miner Extractable Value (MEV), now more broadly called Validator Extractable Value, is the maximum profit that can be extracted by a block producer (miner or validator) by manipulating the order, inclusion, or censorship of transactions within a block they produce, beyond the standard block reward and gas fees. It works by exploiting the inherent latency and transparency of public mempools. For example, a searcher can spot a lucrative arbitrage opportunity on a DEX in the pending transaction pool, then pay a high priority fee to a validator to have their own transaction that captures that profit placed immediately before the pending transaction, a tactic known as front-running. MEV is not created by validators but is a latent value in the transaction set that they have the privilege to capture.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team