Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Maximal Extractable Value (MEV)

The maximum value that can be extracted from block production in excess of standard block rewards and gas fees, primarily through transaction reordering and manipulation.
Chainscore © 2026
definition
BLOCKCHAIN ECONOMICS

What is Maximal Extractable Value (MEV)?

Maximal Extractable Value (MEV) refers to the total profit that can be extracted by block producers—such as validators or miners—through their ability to arbitrarily include, exclude, or reorder transactions within a block they create.

Originally termed Miner Extractable Value, the concept was renamed to Maximal Extractable Value with the rise of proof-of-stake networks, where validators, not miners, produce blocks. MEV arises from the inherent power of a block proposer to manipulate transaction order. This manipulation can be used to profit from opportunities like arbitrage, liquidations in lending protocols, and front-running or sandwich attacks on user trades. The value is "extractable" because it exists as latent profit within the public mempool, waiting to be captured by the entity controlling block production.

The primary sources of MEV are DeFi arbitrage and liquidations. In a simple arbitrage scenario, a price discrepancy for an asset (e.g., DAI) between two decentralized exchanges (DEXs) creates a risk-free profit. A searcher's bot submits a transaction to buy low on one DEX and sell high on the other. A block producer who sees this profitable transaction can front-run it by inserting their own identical transaction first, stealing the opportunity. Similarly, in lending protocols like Aave, undercollateralized positions can be liquidated for a bonus; producers can prioritize their own liquidation transactions to claim this reward.

MEV has significant negative externalities for the network, including network congestion and increased gas fees due to bidding wars between searchers. It also leads to a poorer user experience through transaction reordering and failed trades. To mitigate these issues, solutions like Flashbots have emerged, creating private transaction channels (the Flashbots Relay) that allow searchers to submit transaction bundles to validators without revealing them to the public mempool. This reduces wasteful on-chain bidding and can return a portion of the MEV profit to the validator, making the extraction process more efficient and transparent.

The long-term ecosystem impact of MEV is a major research area. Proposer-Builder Separation (PBS) is a proposed protocol-level design, notably for Ethereum, that formally separates the role of block builder (who assembles transactions and extracts MEV) from the block proposer (who simply selects the highest-paying block). This aims to democratize access to MEV and prevent the centralization of block production power. Other approaches include encrypted mempools and fair ordering protocols that attempt to neutralize the advantage of transaction ordering.

etymology
TERM BACKGROUND

Etymology and Origin

The term Maximal Extractable Value (MEV) emerged from the practical mechanics of blockchain transaction ordering and its inherent financial opportunities.

The term Maximal Extractable Value (MEV) was coined in a 2019 paper by Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels, titled 'Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges'. It was defined as the maximum value that can be extracted from block production in excess of the standard block reward and gas fees, by including, excluding, and reordering the transactions within a block. The term was a direct successor to the concept of Miner Extractable Value, reflecting the original context where Proof-of-Work (PoW) miners controlled this privilege.

The etymology traces a clear lineage from miner to maximal, marking a conceptual expansion. Miner Extractable Value described the profit specific to the mining role in PoW systems. As blockchain consensus evolved to include Proof-of-Stake (PoS) validators and other actors like searchers and builders, the term was generalized to Maximal Extractable Value to encompass the broader, protocol-agnostic economic phenomenon. This shift acknowledged that the value extraction was a property of the permissionless sequencing process itself, not solely of the miner.

The 'Maximal' component is technically precise, referring to an optimization problem. Searchers compete in a free market to identify profitable opportunities—such as arbitrage, liquidations, or sandwich attacks—and compute the theoretically maximum profit from a given set of pending transactions. In practice, the extracted value is often less than this theoretical maximum due to competition and costs, leading some to use the term Realized Extractable Value (REV). The original paper's framing established MEV not just as a revenue source, but as a critical vector for systemic risk and consensus instability.

The rapid adoption of 'MEV' in researcher and developer lexicon underscores its utility in describing a fundamental, and often adversarial, force within decentralized finance. It connects directly to core computer science and economics concepts like the ordering problem, time-bandit attacks, and Prisoner's Dilemma dynamics among block producers. Understanding its origin is key to analyzing modern blockchain design, which now includes MEV mitigation strategies like fair sequencing services, commit-reveal schemes, and proposer-builder separation (PBS) as direct responses to the challenges the term defines.

key-features
MECHANICS & IMPACTS

Key Features of MEV

Maximal Extractable Value (MEV) is the total value that can be extracted from block production beyond standard block rewards and gas fees, primarily through transaction ordering and inclusion.

01

Transaction Ordering

The core mechanism of MEV. Validators and searchers reorder transactions within a block to maximize profit. This can be used for arbitrage (e.g., exploiting price differences between DEXs) or liquidations (e.g., triggering a loan collateral sale). The ability to control the sequence of pending transactions is the primary source of extractable value.

02

Sandwich Attacks

A predatory MEV strategy where a searcher exploits a large pending trade. The attack involves:

  • Front-running: Placing a buy order just before the victim's large buy.
  • Back-running: Selling the acquired asset immediately after, profiting from the price impact caused by the victim's trade. This results in slippage and worse execution for the end user.
04

Economic Redistribution

MEV fundamentally redistributes value within the blockchain ecosystem. Value flows from:

  • End users (via worse trade prices) and liquidity providers (via arbitrage)
  • To searchers (who identify opportunities), block builders (who construct profitable blocks), and validators (who propose the blocks). This creates a complex economic layer atop the base blockchain protocol.
05

Network Congestion & Inefficiency

Competitive, on-chain MEV extraction has significant downsides:

  • Gas Price Wars: Searchers bid up gas fees to get transactions included, increasing costs for all users.
  • Failed Transactions: Many speculative MEV transactions fail but still consume block space.
  • Chain Reorgs: Validators may be incentivized to reorganize the chain to capture MEV, threatening chain stability.
06

Proposer-Builder Separation (PBS)

A design paradigm, formalized by MEV-Boost, that separates the roles of block proposer (validator) and block builder. Builders compete to create the most profitable block (including MEV) and bid for the right to have their block proposed. This aims to democratize MEV access, improve validator rewards, and mitigate centralization risks from sophisticated in-house block building.

how-it-works
MECHANICS

How MEV Works: The Extraction Process

Maximal Extractable Value (MEV) is extracted by sophisticated actors, often called searchers or validators, who algorithmically reorder, insert, or censor transactions within a block to capture profit.

The extraction process begins with searchers running complex algorithms to scan the mempool (the pool of pending transactions) and the current state of the blockchain. They identify profitable opportunities, such as arbitrage between decentralized exchanges, liquidations in lending protocols, or sandwich attacks against large trades. For each opportunity, the searcher constructs a bundle—a custom set of transactions designed to execute their strategy. This bundle is then submitted to the network, typically via a relay, with an attached bid or priority fee to incentivize a block producer to include it.

Block producers, such as validators in Proof-of-Stake systems or miners in Proof-of-Work, receive these bundles and bids. Their role is to select and order the transactions for the next block. To maximize their own revenue, they will often choose the set of transactions and bundles that offer the highest total fees, which includes the standard gas fees plus any extra MEV-related payments. This creates a competitive auction where searchers bid against each other, and the block producer captures a significant portion of the extracted value. In some cases, validators can also act as searchers themselves, a practice known as proposer-builder separation (PBS) is designed to mitigate.

The most common extraction techniques include DEX arbitrage, which exploits price differences across pools; liquidations, where a searcher pays off an undercollateralized loan to claim a reward; and the sandwich attack, where a large victim trade is front-run and back-run to profit from the resulting price slippage. Each method relies on the searcher's ability to have their transaction executed in a specific position relative to others in the block, demonstrating that transaction ordering is a critical and monetizable resource.

This process has significant systemic implications. The competition to extract MEV increases network congestion and gas fees for all users. It can also lead to chain reorganizations (reorgs) if validators discard blocks to mine more profitable ones, undermining network stability. Furthermore, the predatory nature of attacks like sandwiching represents a direct cost extracted from regular users. The blockchain community actively researches solutions, such as encrypted mempools, fair ordering protocols, and PBS, to democratize access and reduce the negative externalities of MEV extraction.

common-strategies
EXTRACTION METHODS

Common MEV Extraction Strategies

These are the primary technical methods searchers and bots use to capture value from blockchain transaction ordering and execution.

02

Liquidations

Capitalizing on undercollateralized loans in lending protocols like Aave or Compound. When a loan's collateral value falls below a required threshold, it becomes eligible for liquidation. Searchers compete to be the first to submit a liquidation transaction, paying a fee to the protocol and often receiving a liquidation bonus from the borrower's collateral.

  • This is considered a "necessary" form of MEV that maintains protocol solvency.
  • Creates a competitive, automated market for risk management.
03

Sandwich Trading

A predatory strategy that exploits visible pending transactions in the mempool. A searcher identifies a large pending DEX trade that will move the market price. They then:

  1. Front-run it: Buy the asset before the victim's trade executes, driving the price up.
  2. Let the victim's trade execute at the worse price.
  3. Back-run it: Sell the asset immediately after, profiting from the inflated price.
  • Extracts value directly from the victim trader's slippage.
  • Mitigated by using private transactions or DEXes with built-in protection.
04

Time-Bandit Attacks

A more complex and potentially chain-reorganizing attack where a validator or coordinated group (miners in Proof-of-Work) rewrites blockchain history to extract MEV. Instead of competing in the current block, they mine a secret alternative chain, include profitable MEV transactions, and then attempt to reorg the canonical chain to make their version dominant.

  • Represents a consensus-level threat to blockchain security and finality.
  • Mitigated by mechanisms like proposer-builder separation (PBS) and faster finality.
05

Long-Tail Exotics

A category of niche, protocol-specific strategies that emerge from unique DeFi mechanics. These are often one-off opportunities or require deep protocol knowledge.

  • NFT MEV: Sniping undervalued NFTs in minting phases or exploiting marketplace listings.
  • Oracle Manipulation: Creating transactions to skew an oracle price feed for profit elsewhere (e.g., in a derivatives market).
  • Governance Attacks: Accumulating voting power to pass proposals that create exploitable conditions.
  • Bridge Arbitrage: Exploiting price differences between an asset on a Layer 1 and its bridged version on a Layer 2.
ecosystem-actors
MAXIMAL EXTRACTABLE VALUE

Key Actors in the MEV Ecosystem

The MEV supply chain is composed of specialized participants who search for, capture, and distribute value extracted from blockchain transaction ordering.

02

Block Builders

Block builders are specialized nodes that construct execution payloads (full blocks) by selecting and ordering transactions from the mempool and searcher bundles. They compete to create the most profitable block for a validator, as the builder offering the highest bid typically wins. Their role is central to Proposer-Builder Separation (PBS) architectures, where they abstract block construction from block proposal.

03

Validators / Proposers

Validators (or proposers in Proof-of-Stake) are the entities with the right to propose the next block. They receive blocks from builders and select the one with the highest bid, collecting the associated payment. Their key decision is which block to propose, and in a PBS model, they are incentivized to choose the most profitable, revenue-maximizing block.

04

Relays

Relays are trust-minimized intermediaries between builders and proposers. They receive blocks from builders, perform basic validity checks (e.g., no censorship, correct fee recipient), and present a sealed-bid auction to proposers. Relays ensure proposers see only the header and bid, not the block contents, preventing theft of MEV strategies. They are a critical component for enforcing PBS.

05

Users & Applications

Regular users and decentralized applications (dapps) are the source of MEV opportunities. Their transactions—such as large DEX swaps, loan repayments, or NFT bids—create the latent value that searchers extract. Users are often negatively impacted by frontrunning and sandwich attacks, which increase their slippage and transaction costs.

06

MEV Marketplaces & Infrastructure

These are platforms and services that facilitate MEV extraction. Key examples include:

  • Flashbots Auction: A private transaction channel and bundle marketplace.
  • Order Flow Auctions (OFAs): Platforms where wallets or dapps auction their users' transaction flow to the highest bidder.
  • Blockchain APIs & RPC Providers: Services that offer enhanced access to mempool data and transaction simulation, crucial for searchers.
security-considerations
MAXIMAL EXTRACTABLE VALUE (MEV)

Security Considerations and Risks

Maximal Extractable Value (MEV) refers to the profit that can be extracted by reordering, including, or censoring transactions within a block, creating significant security and fairness risks for the network and its users.

01

Front-Running and Sandwich Attacks

Front-running occurs when a searcher sees a pending transaction (e.g., a large DEX trade) and submits their own transaction with a higher gas fee to execute first, profiting from the price impact. A sandwich attack is a specific form where the attacker places one order before and one after the victim's trade, capturing the spread.

  • Example: A user's large buy order for a token is detected in the mempool. A bot front-runs it, buying the token first, which drives the price up, and then sells into the user's order for a profit.
02

Time-Bandit Attacks and Reorgs

This is a risk where validators or miners are incentivized to reorganize the blockchain (reorg) to capture MEV from past blocks. A time-bandit attack involves rewriting history by mining an alternative chain that excludes a profitable block and replaces it with one that captures that value for the attacker.

  • Impact: This undermines blockchain finality and consensus security, as it makes previously confirmed transactions potentially reversible for profit.
03

Censorship and Transaction Exclusion

Validators can censor transactions by excluding them from blocks entirely. This can be done for profit (e.g., ignoring arbitrage opportunities to capture them later) or maliciously (e.g., blocking transactions from specific addresses).

  • Centralization Risk: Large, sophisticated validators with advanced MEV capabilities can outcompete smaller ones, leading to validator centralization, which poses a systemic risk to network security and neutrality.
04

Economic Inefficiency and Gas Price Wars

The competition to capture MEV leads to gas price auctions, where searchers bid up transaction fees to have their bundles included. This results in:

  • Network Congestion: Spikes in base gas fees for all users.
  • Economic Waste: A significant portion of the value extracted is burned or paid as fees rather than accruing to users or the protocol, representing a deadweight loss.
05

Mitigation: Proposer-Builder Separation (PBS)

Proposer-Builder Separation (PBS) is a design pattern that mitigates MEV centralization risks by separating the roles of block builder (who constructs profitable blocks) and block proposer (who proposes the block to the network).

  • How it works: Builders compete in a marketplace to create the most valuable block. Proposers simply choose the block with the highest bid, reducing their ability to perform sophisticated MEV extraction and promoting a more neutral and decentralized block production process.
mitigation-solutions
BLOCKCHAIN SECURITY

MEV Mitigation and Solutions

A technical overview of the strategies and protocols designed to detect, reduce, and redistribute the value extracted by miners and validators from transaction ordering.

MEV (Maximal Extractable Value) mitigation refers to the suite of technical and economic mechanisms designed to reduce the negative externalities—such as network congestion, unfair transaction ordering, and increased costs for end-users—caused by the extraction of value from blockchain transaction ordering. The primary goals are to protect users from front-running and sandwich attacks, democratize access to extraction opportunities, and enhance the overall fairness and efficiency of the network. Solutions range from protocol-level changes to application-layer tools, collectively aiming to transform MEV from a predatory force into a more transparent and redistributable resource.

At the protocol layer, a leading mitigation strategy is proposer-builder separation (PBS). This architecture decouples the role of the block builder, who assembles transactions and extracts MEV, from the proposer (validator), who simply selects the most profitable block. PBS, implemented in Ethereum through mev-boost after The Merge, creates a competitive market for block building. This reduces the centralization pressure on validators and can make extraction opportunities more transparent. Other protocol approaches include encrypted mempools, like those proposed for SUAVE, which hide transaction details until they are included in a block, thwarting front-running bots.

Application-layer solutions provide tools for users and developers to protect their transactions. Flashbots Protect and similar RPC endpoints allow users to submit transactions directly to builders, bypassing the public mempool and avoiding predatory bots. Transaction bundling services enable complex DeFi operations to be executed atomically, preventing them from being exploited. Furthermore, fair sequencing services and commit-reveal schemes are designed to enforce first-come, first-served transaction ordering or obfuscate intent, making it harder for searchers to profit at users' expense.

Economic and governance mechanisms focus on the redistribution of extracted value. MEV smoothing protocols aim to distribute MEV rewards more evenly among all validators over time, rather than concentrating them on those who propose individual lucrative blocks. MEV burn proposals suggest destroying a portion of extracted value, similar to EIP-1559's fee burn, to reduce the incentive for excessive extraction. MEV redistribution channels a share of the profits back to the users who generated the opportunity, often through mechanisms like CowSwap's surplus capture or via direct rebates.

The landscape of MEV mitigation is rapidly evolving, representing a critical frontier in blockchain design. Effective solutions must balance security, decentralization, and liveness while acknowledging that some forms of MEV, like arbitrage, are economically beneficial for market efficiency. The long-term success of these mitigations will depend on their ability to create credibly neutral and transparent systems where value extraction is a visible market service rather than a hidden tax on users.

INTENT & IMPACT

Comparison: Benign vs. Malicious MEV

This table distinguishes MEV extraction based on its intent and impact on network health and other users.

CharacteristicBenign MEVMalicious MEV

Primary Intent

Improve execution or capture protocol rewards

Extract value at direct cost to other users

Network Impact

Neutral or positive (e.g., improves liquidity)

Degrades performance and fairness (e.g., causes congestion)

Common Example

Arbitrage, Liquidations

Frontrunning, Sandwich Attacks

User Experience

Generally unaffected or improved

Degraded (worse prices, failed transactions)

Protocol View

Often incentivized or tolerated

Actively mitigated (e.g., via PBS, encryption)

Economic Efficiency

Enhances market efficiency

Creates deadweight loss and rent extraction

Transaction Order

Exploits existing public state

Manipulates pending transaction order

MAXIMAL EXTRACTABLE VALUE

Frequently Asked Questions (FAQ)

Answers to common technical questions about MEV, its mechanisms, and its impact on blockchain ecosystems.

Maximal Extractable Value (MEV) is the maximum profit that can be extracted by a block producer (e.g., a validator or miner) through the ability to arbitrarily include, exclude, or reorder transactions within a block they produce. It arises from the inherent flexibility in block construction on blockchains like Ethereum, allowing actors to capture value from transaction ordering beyond standard block rewards and gas fees. This value is often extracted through strategies like arbitrage, liquidations, and sandwich attacks. MEV represents a fundamental economic force in permissionless blockchains, redistributing wealth and influencing network security and user experience.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team