Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

MEV Extraction

MEV extraction is the process of capturing value by strategically including, excluding, or reordering transactions within a blockchain block.
Chainscore © 2026
definition
BLOCKCHAIN GLOSSARY

What is MEV Extraction?

The process of capturing value from the ability to include, exclude, or reorder transactions within a block.

MEV (Maximal Extractable Value) extraction is the practice by which network participants—primarily validators, block producers, and specialized searchers—profit from their ability to influence the content and order of transactions in a new block. This value is not from block rewards or transaction fees but from the strategic manipulation of the transaction sequence itself. The most common form is arbitrage, where a searcher exploits price differences between decentralized exchanges by having their profitable trade executed before others.

The technical foundation for extraction is the mempool, a public waiting area for pending transactions. Searchers run sophisticated algorithms to scan the mempool for profitable opportunities, then craft and submit bundles of transactions to validators via private channels. Validators, who have the ultimate authority to build the block, can choose to include these bundles for a share of the profits, a practice known as MEV auction. This creates a complex, often opaque market for block space priority.

Beyond simple arbitrage, other extraction strategies include liquidations (triggering undercollateralized loans for a bounty), sandwich attacks (placing orders before and after a victim's large trade to profit from slippage), and time-bandit attacks (reorganizing past blocks to capture missed MEV). These activities can have negative externalities, such as increased network congestion and higher gas fees for regular users, leading to what is termed MEV tax.

The ecosystem has developed infrastructure to manage MEV, notably through Flashbots and its MEV-Boost middleware for Ethereum, which creates a transparent auction market to reduce the harmful effects of off-chain competition. Proposer-Builder Separation (PBS) is a longer-term architectural solution, formally dividing the roles of block building and proposal to democratize access and mitigate centralization risks posed by sophisticated extraction operations.

etymology
TERM ORIGINS

Etymology and Origin

The term **MEV Extraction** has a precise and revealing origin story, born from the technical realities of blockchain consensus and the economic incentives of its participants.

The term MEV (Miner Extractable Value) was coined in a 2019 paper by Phil Daian and his co-authors at Cornell University, titled "Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges." The initial focus was on miners (the validators in Proof-of-Work systems like Ethereum at the time), who had the unique power to extract value by reordering, including, or censoring transactions within a block. The phrase MEV Extraction thus directly describes the act of capturing this latent profit by exploiting the discretionary ordering power inherent in blockchain consensus.

The etymology reflects a shift in perspective. Prior to the formalization of MEV, behaviors like front-running and back-running were seen as isolated exploits or malicious trading. The MEV framework recast these actions as a systemic, quantifiable resource—"extractable value"—that is a natural byproduct of permissionless block creation. The term extraction is key; it implies this value exists in the "wild" state of pending transactions, waiting to be mined and captured by sophisticated actors using bots and specialized software, often at the expense of regular users.

With Ethereum's transition to Proof-of-Stake, the term evolved. While Miner Extractable Value became Maximal Extractable Value (retaining the MEV acronym), the core concept of extraction remained unchanged. The validator's role changed, but the economic mechanism—profiting from the ability to determine transaction order—persisted. The language solidified, with MEV Extraction becoming the standard descriptor for the entire ecosystem of strategies, including arbitrage, liquidations, and sandwich attacks, and the infrastructure like searchers, builders, and relays that has emerged to facilitate it.

key-features
MECHANISMS

Key Features of MEV Extraction

MEV extraction is not a single action but a collection of strategies that exploit the ordering and content of transactions within a block. These are the primary methods used by searchers and validators.

01

Frontrunning

The practice of placing a transaction immediately before a known pending transaction to profit from its anticipated price impact. This is often done by observing the mempool and using higher gas fees to ensure priority placement.

  • Example: A searcher sees a large pending DEX swap for ETH/USDC. They buy ETH first, causing the price to rise, then sell the ETH into the victim's trade for a profit.
02

Backrunning

Placing a transaction immediately after a target transaction to capitalize on the state changes it creates. This is common with DEX arbitrage and liquidations.

  • Example: After a large trade creates a price imbalance between two DEXs, a searcher executes an arbitrage trade in the same block to capture the spread. This can be a neutral or even beneficial form of MEV.
03

Sandwich Attack

A specific, harmful form of frontrunning that surrounds a victim's trade. The attacker places one order before and one after the target transaction.

  • Process: 1. Frontrun: Buy the asset, driving the price up. 2. Victim executes: Their trade occurs at the worse, inflated price. 3. Backrun: Sell the asset, profiting from the price increase caused by the victim's trade. This results in slippage and lost value for the victim.
04

Time-Bandit Attacks

A sophisticated attack where a validator or miner reorganizes the blockchain (reorg) to extract MEV from past blocks. This undermines blockchain finality.

  • Mechanism: A validator withholds a mined block, sees a more profitable transaction ordering in a competitor's block, and then attempts to mine a longer chain starting from the parent block to 'steal' the profitable ordering. This is a major security concern mitigated by proposer-builder separation (PBS).
05

Liquidation

The process of seizing undercollateralized positions in lending protocols (like Aave, Compound) is a primary source of MEV. Searchers compete to be the first to submit a liquidation transaction, earning a liquidation fee.

  • This is often considered 'good' or necessary MEV, as it maintains the protocol's solvency. Competition is focused on latency and gas optimization to be first.
06

Arbitrage

Exploiting price differences for the same asset across different decentralized exchanges (DEXs) or liquidity pools. This is a fundamental, market-stabilizing form of MEV.

  • Process: A searcher buys an asset on the cheaper DEX and simultaneously sells it on the more expensive one, profiting from the spread. This activity helps align prices across the ecosystem.
how-it-works
MECHANICS

How MEV Extraction Works

A technical breakdown of the processes and strategies used to capture value from blockchain transaction ordering and inclusion.

MEV extraction is the process by which specialized network participants, known as searchers, identify and execute profitable opportunities by influencing the order, inclusion, or exclusion of transactions within a block. This is achieved by submitting complex, often automated transaction bundles to block builders or directly to validators. The core mechanism relies on the ability to observe the mempool (the pool of pending transactions), predict their outcomes, and front-run, back-run, or sandwich other users' transactions for profit.

The extraction workflow typically follows a multi-layered architecture. First, searchers run algorithms to scan for opportunities like arbitrage between decentralized exchanges, liquidations in lending protocols, or NFT minting inefficiencies. Upon identifying a target, they construct a bundle—a set of transactions with strict execution order dependencies—and submit it to a relay, which acts as a trusted intermediary. The relay forwards the most profitable bundles to block builders, who assemble the candidate block for the validator.

The most common extraction techniques include front-running, where a searcher's transaction is placed immediately before a target transaction to capitalize on its anticipated price impact; back-running, where a transaction is placed immediately after to profit from the new state; and the sandwich attack, a combination of both that places orders on either side of a victim's large trade. Other forms include time-bandit attacks, which attempt to reorganize past blocks, and long-tail extraction from less competitive niches.

The entity that ultimately captures the extracted value depends on the blockchain's consensus model and market structure. In Proof-of-Work, miners could directly perform extraction. In Proof-of-Stake ecosystems like Ethereum, validators typically outsource block building to specialized builders via a proposer-builder separation (PBS) model. The validator selects the most profitable block header, and the MEV profit is shared between the builder (who executed the extraction) and the validator (who proposed the block) as an extra reward.

The infrastructure for MEV extraction has evolved into a sophisticated ecosystem comprising searcher bots, private transaction pools (like Flashbots Protect), block builder marketplaces, and relays. This specialization increases efficiency but also centralizes block-building power. Consequently, MEV extraction raises critical concerns about network congestion, fairness for regular users, and chain security, driving research into mitigations like fair sequencing services and encrypted mempools.

extraction-techniques
MECHANISMS

Common MEV Extraction Techniques

Maximal Extractable Value (MEV) is extracted from blockchain transactions through specific, automated strategies. These techniques exploit the public mempool, transaction ordering, and state changes to capture value.

01

Frontrunning

A general term for placing a transaction ahead of a known pending transaction to profit from its execution. This includes priority gas auctions (PGAs) where searchers bid up gas prices to win block position. For example, a searcher might frontrun a large DEX trade to buy the asset first and sell it to the victim transaction at a higher price.

02

Backrunning

Placing a transaction immediately after a target transaction to profit from the state changes it creates. Common with DEX arbitrage and liquidations. For instance, after a large trade creates a price imbalance between two DEXs, a backrun arbitrage transaction corrects the price, capturing the difference. It's often less competitive than frontrunning.

03

Sandwich Attack

A specific, two-transaction attack that sandwiches a victim's DEX trade. The attacker:

  • Frontruns the victim's buy order, purchasing the asset and driving the price up.
  • Lets the victim's trade execute at the inflated price.
  • Backruns by selling the asset at the new higher price, profiting from the spread. This directly reduces the victim's trade efficiency.
04

Arbitrage

Exploiting price differences for the same asset across different liquidity pools or markets. This is often considered a benign or necessary form of MEV as it enforces price uniformity. Requires sophisticated monitoring of multiple DEXs (Uniswap, Sushiswap, etc.) and fast execution to capture fleeting opportunities before others.

05

Liquidation

Triggering the forced closure of an undercollateralized loan in a lending protocol (like Aave or Compound). Liquidators repay part of the debt in exchange for the borrower's collateral at a discount. This is a critical, incentivized function in DeFi, but searchers compete to be the first to submit the liquidation transaction, often using high gas bids.

06

Time-Bandit Attacks

An advanced technique where a miner or validator reorganizes the blockchain (reorg) to extract MEV from past blocks. This involves mining an alternative chain history that excludes certain transactions and inserts profitable ones in their place. It undermines blockchain finality and is mitigated by proposer-builder separation (PBS) in Ethereum's roadmap.

participants-roles
MEV EXTRACTION

Participants in the MEV Supply Chain

Maximal Extractable Value (MEV) extraction is a multi-party process involving specialized actors who identify, capture, and redistribute value from blockchain transaction ordering.

01

Searchers

Searchers are independent agents or bots that scan the mempool and simulate state changes to identify profitable MEV opportunities. They construct arbitrage, liquidations, or sandwich attacks and submit transaction bundles to validators for inclusion.

  • Primary Role: Opportunity discovery and bundle creation.
  • Tools: Use sophisticated algorithms and private RPCs to gain an edge.
  • Example: A searcher spots a large DEX swap that will move the price, then front-runs it with their own trade.
02

Builders

Builders are specialized block producers that compete to construct the most valuable block by aggregating transactions and bundles from searchers. They optimize for the validator's revenue (the block reward plus transaction fees and MEV).

  • Primary Role: Block construction and optimization.
  • Mechanism: Use a builder API to receive bundles and assemble a complete block proposal.
  • Proposer-Builder Separation (PBS): A design where builders and proposers (validators) are distinct roles to mitigate centralization risks.
03

Proposers (Validators)

Proposers are the validators chosen to propose a new block for the network. In the MEV supply chain, they typically accept the most profitable block header from builders via a relay.

  • Primary Role: Block proposal and consensus.
  • Incentive: They select the builder's block offering the highest payment (the bid).
  • Key Concept: Under PBS, the proposer commits to a block header without seeing the full contents, trusting the builder's execution.
04

Relays

Relays are trust-minimized intermediaries that facilitate communication between builders and proposers in a Proposer-Builder Separation (PBS) model. They receive full blocks from builders and header/bid information to proposers.

  • Primary Role: Mitigate censorship and ensure fair auction.
  • Function: Relays validate builder blocks, run them against local execution, and present the highest bids to proposers.
  • Trust Assumption: Proposers must trust the relay not to censor builders or manipulate bids.
05

Users & Applications

Regular users and decentralized applications (dapps) are the source of MEV opportunities through their transactions. Their actions—like large trades or undercollateralized loans—create the profit pools that searchers exploit.

  • Impact: Users often bear the cost of MEV through slippage (sandwich attacks) or missed opportunities.
  • Solutions: Use private transaction pools (e.g., Flashbots Protect, Taichi Network) or MEV-aware protocols to shield transactions from extraction.
ecosystem-usage
MEV EXTRACTION

Ecosystem Impact and Usage

Maximal Extractable Value (MEV) extraction has profound effects on blockchain ecosystems, creating both opportunities and systemic risks. Its impact spans user experience, network security, and the fundamental economics of block production.

01

Negative Externalities for Users

MEV extraction directly harms end-users through practices like front-running and sandwich attacks. These tactics result in:

  • Increased transaction costs as bots compete in gas auctions.
  • Failed transactions and slippage when trades are exploited.
  • Censorship where certain transactions are excluded from blocks.
  • A degraded, unpredictable experience that undermines trust in decentralized applications.
02

Centralization of Block Production

The profitability of MEV creates powerful incentives that can lead to centralization. This occurs through:

  • Proposer-Builder Separation (PBS), where specialized block builders with advanced algorithms dominate.
  • The rise of MEV relays as trusted intermediaries between builders and validators.
  • Economic pressure favoring large, sophisticated validator pools that can capture more value, potentially threatening network neutrality and censorship-resistance.
03

In-Game & NFT Market Exploitation

MEV strategies extend beyond DeFi into gaming and NFT ecosystems. Common exploits include:

  • Sniping rare NFTs or in-game assets by front-running public mint transactions.
  • Jito-style bundles to guarantee placement for asset purchases during high-demand drops.
  • Exploiting on-chain game mechanics (e.g., claiming rewards, land sales) by observing the mempool, creating an unfair environment for regular players.
04

MEV Redistribution & Democratization

Protocols have emerged to mitigate MEV's negative impacts and redistribute its value. Key solutions include:

  • Flashbots SUAVE: A decentralized block-building network aiming to democratize access.
  • MEV-Boost (Ethereum): A marketplace that allows validators to outsource block building, capturing MEV rewards.
  • MEV smoothing or burning mechanisms, like EIP-1559's base fee, which can capture some extractable value for the network or its users.
05

Cross-Chain & L2 MEV

MEV dynamics evolve with multi-chain ecosystems. Key considerations include:

  • Cross-chain MEV (ccMEV): Arbitrage between assets on different chains via bridges, requiring sophisticated coordination.
  • L2 Sequencing MEV: On Optimistic and ZK Rollups, the sequencer has privileged transaction ordering, creating a centralized MEV capture point.
  • Emerging solutions like shared sequencers and decentralized sequencing aim to manage these new attack vectors.
06

Long-Term Protocol Design Influence

MEV is a first-order consideration in new blockchain and application design. This influences:

  • Encrypted Mempools (e.g., Shutter Network) to prevent front-running.
  • Fair Sequencing Services that order transactions by received time.
  • Application-specific mechanisms like CowSwap's batch auctions or FBA (Frequency-Bonding Auctions) that are inherently more resistant to extraction.
security-considerations
MEV EXTRACTION

Security Considerations and Risks

Maximal Extractable Value (MEV) extraction introduces systemic risks to blockchain security and user experience, creating adversarial incentives that can undermine network stability.

01

Frontrunning and Sandwich Attacks

The most common MEV attack where a searcher's transaction is ordered before (frontrun) and after (backrun) a victim's trade to profit from predictable price impact. This directly harms users by increasing their slippage and execution costs.

  • Mechanism: Searchers use bots to detect pending DEX trades in the mempool.
  • Impact: Users receive worse prices, paying an implicit 'MEV tax'.
  • Example: A large Uniswap swap is sandwiched, costing the user thousands in lost value.
02

Time-Bandit Attacks and Chain Reorgs

A severe threat to blockchain consensus where validators or miners are incentivized to re-write recent blockchain history to capture MEV they missed. This undermines the finality and immutability of the ledger.

  • Mechanism: A validator withholds a block to create a private chain fork that includes profitable MEV transactions.
  • Risk: Compromises settlement guarantees, enabling double-spending.
  • Mitigation: Protocols like Ethereum's proposer-builder separation (PBS) aim to reduce this incentive.
03

Centralization Pressure on Validators

The profitability of MEV extraction creates economies of scale, favoring large, sophisticated validator operations. This can lead to validator centralization, which poses a censorship and single-point-of-failure risk to the network.

  • Cause: Access to low-latency infrastructure, proprietary data, and advanced algorithms is not evenly distributed.
  • Outcome: Smaller validators are outcompeted, reducing network resilience.
  • Evidence: Post-merge Ethereum has seen a rise in dominant block-building entities.
04

Network Congestion and Gas Price Spikes

MEV extraction activities, particularly during volatile market events, generate massive volumes of competing transactions. This floods the mempool, driving up gas prices for all network users and causing delays.

  • Trigger: Events like liquidations, oracle updates, or major NFT mints.
  • Consequence: Regular users are priced out of timely transactions.
  • Example: The 2021 'Gas Wars' during popular NFT launches saw gas prices exceed 5,000 Gwei.
05

Censorship and Transaction Exclusion

Validators or block builders can be incentivized to exclude certain transactions from blocks, either for profit (e.g., ignoring low-fee arbitrage opportunities) or for regulatory compliance, threatening network neutrality.

  • Profit-Driven: Ignoring transactions that compete with the validator's own MEV strategies.
  • Regulatory Risk: Complying with sanctions lists by censoring addresses.
  • Systemic Impact: Undermines permissionless access, a core blockchain tenet.
CLASSIFICATION

MEV Extraction: Beneficial vs. Malicious Forms

A comparison of MEV extraction strategies based on their impact on network users and health.

CharacteristicBeneficial MEVMalicious MEVNeutral / Protocol MEV

Primary Goal

Improve execution for users

Profit at user expense

Enforce protocol rules

Network Impact

Positive or neutral

Degrades performance

Essential for function

User Impact

Better prices, faster execution

Front-running, sandwich attacks

Transparent, predictable cost

Example

DEX arbitrage, liquidations

Time-bandit attacks, spam

Validator priority gas auctions

Economic Effect

Improves market efficiency

Extracts value as a tax

Pays for network security

Transparency

On-chain, verifiable

Often obfuscated

Protocol-defined

Mitigation Priority

Optimize

Minimize via PBS, encryption

Manage and formalize

evolution
MEV EXTRACTION

Evolution and Mitigation Efforts

The history of MEV is a continuous cycle of extraction techniques and defensive innovations, driving the development of new protocols and market structures.

The evolution of Maximal Extractable Value (MEV) extraction began with simple front-running and back-running on decentralized exchanges, where bots exploited public mempools to profit from pending transactions. This progressed to more sophisticated strategies like sandwich attacks, which manipulate asset prices around a target trade, and time-bandit attacks, which attempt to reorganize past blocks. The rise of private transaction pools (e.g., Flashbots' mev-geth) marked a pivotal shift, moving transaction ordering off the public chain to reduce negative externalities like network congestion and failed transactions, while still allowing for value extraction.

In response to these evolving threats, a parallel ecosystem of MEV mitigation and redistribution protocols has emerged. Solutions include commit-reveal schemes that hide transaction intent, fair ordering protocols that use cryptographic techniques to sequence transactions, and proposer-builder separation (PBS) architectures, which decentralize block construction. Projects like Flashbots SUAVE aim to create a neutral, decentralized marketplace for block building. Furthermore, protocols like CowSwap and MEVBlocker offer users transaction protection by routing trades through private systems that neutralize front-running and sandwich attacks.

The long-term mitigation landscape focuses on realigning economic incentives and improving transparency. MEV smoothing mechanisms, such as those proposed for Ethereum post-merge, seek to distribute extracted value more evenly among validators rather than concentrating it. MEV burn proposals suggest destroying a portion of extracted value to benefit the entire network. The development of standardized data (e.g., mev-share, mev-boost relays) aims to create a more transparent and auditable MEV supply chain, allowing users to see who is extracting value and enabling more equitable redistribution models through MEV recapture.

MAXIMAL EXTRACTABLE VALUE

Frequently Asked Questions (FAQ)

Maximal Extractable Value (MEV) represents the profit miners or validators can earn by reordering, including, or censoring transactions within a block. This FAQ addresses its core mechanics, risks, and the ecosystem that has evolved around it.

Maximal Extractable Value (MEV) is the maximum profit that can be extracted from block production beyond the standard block reward and gas fees, by strategically reordering, including, or excluding transactions. It works because block producers (miners or validators) have the unilateral power to determine the final order of transactions in a block. This allows them to execute profitable strategies like front-running (placing a transaction ahead of a known pending trade) or back-running (placing one immediately after). Common sources of MEV include DEX arbitrage, liquidations in lending protocols, and NFT minting opportunities. The competition to capture this value is automated by bots that submit transactions with high gas fees to incentivize inclusion.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
MEV Extraction: Definition & How It Works | ChainScore Glossary