Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
Free 30-min Web3 Consultation
Book Now
Smart Contract Security Audits
Learn More
Custom DeFi Protocol Development
Explore
Full-Stack Web3 dApp Development
View Services
LABS
Glossary

Miner Extractable Value (MEV)

Miner Extractable Value (MEV) is the maximum profit that can be extracted by block producers (miners or validators) through reordering, including, or censoring transactions within a block they produce.
Chainscore © 2026
definition
BLOCKCHAIN ECONOMICS

What is Miner Extractable Value (MEV)?

Miner Extractable Value (MEV) refers to the profit that can be extracted by block producers through the ability to arbitrarily include, exclude, or reorder transactions within a block they are creating.

Miner Extractable Value (MEV) is the total value that can be extracted from users of a blockchain by the entity that produces a block, typically a miner or validator. This value arises from the block producer's unique power to determine the final ordering and inclusion of transactions. While originally termed for Proof-of-Work miners, the concept applies equally to validators in Proof-of-Stake systems, leading to the more general term Maximum Extractable Value. The primary sources of MEV are arbitrage opportunities between decentralized exchanges (DEXs), liquidations in lending protocols, and front-running or sandwich attacks on pending user transactions.

The mechanics of MEV exploit the inherent latency and transparency of public mempools. Sophisticated actors, known as searchers, run bots to detect profitable opportunities from pending transactions. They then bid in an auction, paying a high priority fee (or bribe) to block producers to ensure their profitable transaction bundle is included in the next block in a specific order. This creates a competitive market where the value is ultimately captured by the block producer through these fees. On Ethereum, much of this competition is formalized through platforms like Flashbots, which provide a private communication channel to mitigate the negative network effects of public MEV extraction.

MEV has significant implications for network health and user experience. While it represents a form of economic rent for validators, it can lead to network congestion, increased transaction fees for regular users, and chain instability from time-bandit attacks where miners reorg the chain to capture MEV. It also enables predatory strategies like sandwich attacks, where a user's DEX trade is front-run and back-run to extract value from their slippage. The pursuit of MEV is a fundamental, unavoidable force in permissionless blockchains, making its management a critical area of protocol and application-layer research and development.

The ecosystem has developed several countermeasures and refinements to manage MEV. Proposer-Builder Separation (PBS) is a major architectural shift that separates the role of block building from block proposing, creating a competitive market for block building that can democratize access. Fair sequencing services and encrypted mempools aim to prevent front-running by obfuscating transaction order. At the application layer, protocols like CowSwap use batch auctions, and lending protocols employ Dutch auctions for liquidations to make MEV extraction less profitable or to redistribute its value back to users.

etymology
TERM ORIGIN

Etymology and Origin

The term Miner Extractable Value (MEV) emerged from the practical realities of blockchain consensus and transaction ordering, evolving from earlier concepts to describe a specific economic phenomenon.

The term Miner Extractable Value (MEV) was coined in a 2019 paper by Phil Daian and colleagues, titled 'Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges'. It formally defined the profit a block producer (originally a miner in Proof-of-Work) can make by manipulating the order, inclusion, or exclusion of transactions within a block they create, beyond the standard block reward and gas fees. The name directly reflects the original actors—miners—and the value they could extract.

The concept's intellectual origins lie in the long-understood practice of front-running in traditional finance, where a trader exploits advance knowledge of a pending transaction. On blockchains, this evolved into transaction ordering games. Prior to the formalization of MEV, these activities were often described as blockchain arbitrage or priority gas auctions, but lacked a unifying framework. The 2019 paper provided the precise, quantifiable definition that catalyzed extensive research into its systemic risks and market dynamics.

The etymology has since adapted with blockchain evolution. As Proof-of-Stake (PoS) replaced Proof-of-Work on networks like Ethereum, the responsible party shifted from miners to validators. Consequently, the term Maximal Extractable Value (also MEV) is now often used as a more generic, consensus-agnostic label, though the original name remains dominant. This linguistic shift highlights that the economic phenomenon is inherent to permissionless blockchains with a proposer-builder separation model, regardless of the specific consensus mechanism securing the chain.

key-features
DEFINING THE LANDSCAPE

Key Characteristics of MEV

Miner Extractable Value (MEV) is not a monolithic concept but a spectrum of strategies and impacts defined by several core characteristics. Understanding these facets is crucial for analyzing its effects on blockchain security, efficiency, and fairness.

01

Value Source & Extraction

MEV is profit extracted by manipulating the transaction ordering within a block, not from block rewards or fees. It arises from arbitrage opportunities, liquidations, and front-running user transactions. The value exists because block producers (miners or validators) have the sole, temporary privilege to decide the sequence in which pending transactions are executed, allowing them to insert, reorder, or censor transactions for profit.

02

Permissionless & Inevitable

MEV is a permissionless economic phenomenon inherent to any blockchain where transaction ordering influences state outcomes. It is not caused by malicious actors but by the economic design of decentralized ledgers. As long as there are profitable on-chain opportunities (e.g., DEX price differences), sophisticated actors will compete to capture them through transaction ordering, making MEV an inevitable byproduct of decentralized finance.

03

Negative Externalities

The competition to extract MEV creates significant costs for the network and its users:

  • Network Congestion: Bots spam the network with competing transactions, driving up gas fees for all users.
  • Instability: Sandwich attacks and front-running degrade the user experience by causing failed transactions or worse execution prices.
  • Centralization Pressure: The high capital and technical requirements for MEV extraction can lead to validator centralization, as only large, sophisticated players can compete effectively.
04

Redistribution & Democratization

A core goal of MEV research is to redistribute extracted value more fairly and reduce its harmful effects. Solutions include:

  • Proposer-Builder Separation (PBS): Separates block building from proposal to create a competitive market.
  • MEV-Boost: An implementation of PBS for Ethereum, allowing validators to outsource block building to specialized searchers and builders.
  • MEV Smoothing & Redistribution: Protocols like MEV-Share and MEV-Burn aim to capture a portion of MEV and redistribute it to users or burn it, benefiting the broader ecosystem.
05

Ecosystem of Actors

The MEV supply chain involves specialized roles:

  • Searchers: Bots that scan the mempool for profitable opportunities and bundle transactions.
  • Builders: Entities that compete to construct the most valuable block by aggregating searcher bundles and user transactions.
  • Relays: Trust-minimized intermediaries that receive blocks from builders and deliver them to validators/proposers.
  • Proposers: Validators (or their designated block proposer) who select the highest-value block to propose for consensus.
how-it-works
MECHANICS

How Does MEV Extraction Work?

An explanation of the technical processes and strategies used to capture value from transaction ordering on a blockchain.

Miner Extractable Value (MEV) extraction is the process by which network participants—primarily searchers, validators, and specialized bots—identify and capture profit from the ability to reorder, include, or censor transactions within a block. The core mechanism relies on the mempool, a public waiting area for pending transactions. Searchers run sophisticated algorithms to scan the mempool for profitable opportunities, bundle their own transactions to exploit them, and submit these bundles to validators with a high-priority fee, or bribe, to ensure inclusion. The validator, who has the ultimate authority over block construction, selects the most profitable set of transactions, which often includes these MEV bundles, thereby extracting value for both parties.

The most common extraction strategies include arbitrage, where a searcher profits from price differences of an asset across decentralized exchanges (DEXs) within the same block, and liquidations, where a searcher triggers the liquidation of an undercollateralized loan to claim a reward. More complex forms involve sandwich attacks, where a large pending trade is detected, a bot front-runs it to move the price, and then back-runs it to profit from the price impact. These actions are executed via smart contracts in a single atomic transaction bundle, ensuring the searcher either profits from all steps or the entire bundle fails, preventing financial loss.

The infrastructure for MEV extraction has evolved into a sophisticated ecosystem. Searchers use tools like Flashbots to privately submit their transaction bundles to validators, avoiding public mempool exposure and reducing failed transaction costs. Validators often run MEV-Boost software in proof-of-stake Ethereum, which outsources block building to a competitive marketplace of builders who compete to create the most profitable block. This separates block proposal from block building, creating a more efficient and transparent market for MEV, though it also centralizes block construction power among a few specialized players.

common-mev-strategies
MECHANISMS

Common MEV Strategies

Miner Extractable Value (MEV) is profit extracted by reordering, including, or censoring transactions within a block. These are the primary strategies used by searchers and validators.

01

Arbitrage

The most common MEV strategy, where a searcher profits from price discrepancies of the same asset across different decentralized exchanges (DEXs) or liquidity pools.

  • Process: A bot detects a price difference (e.g., ETH is cheaper on Uniswap than on SushiSwap). It executes a buy order on the cheaper DEX and a simultaneous sell order on the more expensive one in a single atomic transaction.
  • Key Feature: Requires atomic execution to eliminate risk; the entire transaction bundle either succeeds or fails.
02

Liquidations

A strategy to profit from undercollateralized loans in lending protocols like Aave or Compound by being the first to trigger a liquidation.

  • Process: When a borrower's collateral value falls below a required health factor, their position becomes eligible for liquidation. Searchers compete to submit a transaction that repays part of the debt in exchange for the collateral at a discount.
  • Result: The searcher earns the liquidation bonus (e.g., 5-10%) as profit. This is considered a "public good" MEV as it maintains protocol solvency.
03

Sandwich Trading

A predatory strategy that exploits a visible pending transaction in the mempool.

  • Process: A searcher spots a large pending DEX trade that will move the market price. They front-run it by buying the same asset first, causing the victim's trade to execute at a worse price. The searcher then back-runs the victim by selling the asset, profiting from the artificial price movement.
  • Impact: This creates negative externalities for the victim trader through increased slippage and is a primary driver for private transaction pools.
04

Time-Bandit Attacks

A sophisticated and disruptive strategy where a validator re-mines past blocks to extract value that was missed.

  • Process: A validator discovers a highly profitable MEV opportunity (e.g., a large arbitrage) that occurred in a recent block. They attempt to reorganize the chain (reorg) by mining a competing chain starting from a block before the opportunity, including their own profitable transaction instead.
  • Risk: This undermines blockchain finality and consensus stability. It is mitigated by proposer-builder separation (PBS) and is more feasible on chains with weak finality.
05

Long-Run MEV

Strategies that extract value over multiple blocks or longer time horizons, often related to DeFi governance or protocol mechanics.

  • Examples:
    • Governance Manipulation: Accumulating voting power to influence protocol decisions (e.g., fee changes, treasury allocations) for personal profit.
    • Oracle Manipulation: Temporarily distorting oracle prices to trigger liquidations or favorable trades on derivative platforms.
    • NFT MEV: Sniping undervalued NFTs from automated listing bots or exploiting reveal mechanisms.
06

Censorship

A non-financial form of MEV where a block proposer excludes certain transactions from a block, often for regulatory or competitive reasons.

  • Process: A validator or a centralized relay, possibly under external pressure, refuses to include transactions from specific addresses (e.g., sanctioned addresses) or related to specific applications.
  • Context: This highlights the tension between decentralization and compliance. Solutions like credible neutrality and permissionless relay networks aim to mitigate this risk.
ecosystem-impact
MINER EXTRACTABLE VALUE (MEV)

Ecosystem Impact and Usage

Miner Extractable Value (MEV) represents profit that can be extracted by reordering, censoring, or inserting transactions within a block, fundamentally influencing network security, user experience, and economic fairness.

01

The Core Mechanism

MEV arises from the ability of block producers (miners or validators) to manipulate the transaction order within a block they create. This allows them to profit from arbitrage opportunities, liquidations, and front-running user transactions. The process is often automated by specialized bots that compete in gas auctions, driving up transaction costs for all users.

02

Negative Externalities

MEV extraction creates significant network downsides:

  • Network Congestion: Bots spam the network with competing transactions.
  • Gas Price Inflation: Gas auctions drive up base fees for regular users.
  • Censorship: Profitable transactions can be excluded to benefit the block producer.
  • Instability: Maximal Extractable Value (MEV) can incentivize reorg attacks, where a miner attempts to rewrite recent blockchain history to capture value.
03

MEV Supply Chain & Searchers

A specialized ecosystem has evolved to capture MEV. Searchers run complex algorithms to detect profitable opportunities and submit transaction bundles. These bundles are sold to block builders via private channels or public relays. The builder assembles the most profitable block and submits it to the validator for inclusion, sharing the profits. This creates a competitive market for block space.

05

MEV in Practice: Common Strategies

Common MEV strategies include:

  • DEX Arbitrage: Exploiting price differences between decentralized exchanges.
  • Liquidation: Triggering undercollateralized loan liquidations for a reward.
  • Sandwich Attacks: Placing orders before and after a large user trade to profit from the price impact.
  • NFT MEV: Front-running NFT mints or exploiting marketplace vulnerabilities.
06

The Future: SUAVE & MEV Democratization

The long-term vision for MEV mitigation involves credible neutrality and democratization. SUAVE (Single Unifying Auction for Value Expression) is a proposed decentralized block builder and mempool that aims to create a transparent, competitive marketplace for transaction ordering. The goal is to return MEV profits to users and applications rather than centralized intermediaries, reducing extractive practices.

security-considerations
MINER EXTRACTABLE VALUE (MEV)

Security Risks and Considerations

Miner Extractable Value (MEV) refers to the profit miners or validators can earn by reordering, including, or censoring transactions within a block they produce. This section details the primary risks and attack vectors that stem from the pursuit of MEV.

01

Front-Running

Front-running occurs when an MEV searcher observes a pending transaction in the mempool (e.g., a large DEX trade) and submits their own transaction with a higher gas fee to execute first, profiting from the anticipated price impact. This is a classic time-bandit attack where the searcher's transaction is placed directly before the victim's.

  • Example: A user submits a trade to buy Token A. A searcher sees this, buys Token A first, and then sells it to the user at a higher price within the same block.
02

Sandwich Attacks

A sandwich attack is a specific, harmful form of front-running where an MEV bot 'sandwiches' a victim's large trade between two of its own transactions.

  • Mechanism: The attacker first buys the asset (front-run), the victim's trade executes and pushes the price up, then the attacker sells the asset at the new higher price (back-run).
  • Impact: This directly increases slippage and transaction costs for the victim, extracting value from their trade.
03

Time-Bandit Attacks & Reorgs

Time-bandit attacks involve miners or validators intentionally reorganizing the blockchain (reorg) to replace a recently produced block with a new one that includes more profitable MEV transactions. This undermines block finality and network stability.

  • Risk: Creates uncertainty for users and applications, as transactions considered confirmed can be reversed. This is a direct attack on the consensus layer's security guarantees.
04

Censorship

Censorship occurs when a miner or validator excludes specific transactions from blocks, often to maximize their own MEV profits or to comply with external pressure. This threatens blockchain neutrality and permissionlessness.

  • Forms: Can be total (blocking all transactions from a blacklisted address) or partial (excluding transactions that compete with the miner's own arbitrage opportunities).
05

Network Congestion & Gas Auctions

The competition to capture MEV leads to Priority Gas Auctions (PGAs), where searchers continuously outbid each other with higher gas fees to get their transaction order executed. This results in:

  • Skyrocketing gas prices for all network users.
  • Network congestion and slower confirmation times for regular transactions.
  • Wasted resources as losing bids still consume block space and computational effort.
06

Centralization Pressure

The technical complexity and capital requirements for sophisticated MEV extraction create significant centralization pressures.

  • Miner/Validator Centralization: Entities with advanced MEV capabilities gain higher profits, incentivizing pooling of resources and leading to hash power or stake concentration.
  • Searcher Centralization: MEV becomes dominated by well-funded, professional firms with proprietary infrastructure, creating barriers to entry and reducing the decentralized nature of the ecosystem.
mitigation-solutions
PROTOCOL & USER DEFENSES

MEV Mitigation Solutions

A suite of technical strategies and protocol-level designs aimed at reducing the negative externalities of Miner Extractable Value, such as front-running, sandwich attacks, and network congestion.

02

Commit-Reveal Schemes

A cryptographic technique where users submit a commitment (a hash of their transaction) first, and only reveal the full transaction details later. This prevents front-running by hiding the transaction's intent and parameters until it is too late for an attacker to insert their own transaction. Commonly used in decentralized exchange auctions and voting mechanisms.

04

Proposer-Builder Separation (PBS)

A protocol design that separates the role of block proposer (validator) from block builder (specialized entity). Builders compete in a sealed-bid auction to create the most profitable block, with the proposer simply selecting the highest bid. This democratizes MEV revenue and reduces the incentive for validators to run complex, centralized MEV extraction software. A core feature of Ethereum's post-merge roadmap.

06

MEV-Aware Smart Contract Design

Protocol-level changes to reduce extractable value in the first place. This includes:

  • Batch auctions: Executing trades at a single clearing price (e.g., CowSwap).
  • Uniform price auctions: Preventing price slippage exploitation.
  • Time-weighted averages: Using TWAP oracles to deter large, manipulative trades.
  • Randomized execution: Adding unpredictability to transaction ordering within a block.
evolution-timeline
FROM SEARCH TO SUITE

Evolution and Future of MEV

Miner Extractable Value (MEV) has evolved from a niche concept into a central force shaping blockchain design, economics, and security. This section traces its progression and explores the emerging solutions and research aimed at its mitigation.

The concept of MEV, initially termed Miner Extractable Value, emerged from the observation that block producers (miners or validators) could reorder, censor, or insert transactions within a block for profit. Early research, notably the 2019 paper "Flash Boys 2.0," quantified this value, revealing its scale and systemic risks like time-bandit attacks and network congestion. This marked the first phase: identification and quantification, shifting MEV from a theoretical possibility to a measurable economic reality with significant security implications.

The evolution accelerated with the rise of DeFi and on-chain arbitrage, leading to the professionalization of MEV extraction. Entities known as searchers began using sophisticated bots to compete in public mempools, while block builders emerged to aggregate and optimize transaction bundles for validators. This created a supply chain where value flowed from opportunities (e.g., DEX arbitrage, liquidations) through searchers and builders to validators, formalizing MEV as a core, albeit contentious, component of blockchain revenue and infrastructure.

The current and future trajectory is defined by the pursuit of MEV mitigation and democratization. Proposer-Builder Separation (PBS), a key Ethereum roadmap feature, aims to separate the roles of block building and proposal to reduce centralization and censorship risks. Complementary solutions like encrypted mempools (e.g., Shutter Network) and fair ordering protocols seek to obfuscate transaction content until inclusion, while MEV smoothing and MEV-Boost-like auctions attempt to redistribute extracted value more broadly across validators and stakers, moving towards a more equitable and secure ecosystem.

MINER EXTRACTABLE VALUE (MEV)

Frequently Asked Questions (FAQ)

Miner Extractable Value (MEV) represents profit extracted by block producers by reordering, including, or censoring transactions within a block. This FAQ addresses its mechanisms, impacts, and the ecosystem designed to manage it.

Miner Extractable Value (MEV) is the maximum profit that can be extracted by a block producer (e.g., a miner or validator) by manipulating the order and inclusion of transactions within a block they produce. It works by exploiting the inherent flexibility in block construction. For example, a searcher might spot a profitable arbitrage opportunity between two decentralized exchanges (DEXs). They submit a transaction to execute this trade. A block producer can see this pending transaction, copy its logic, and front-run it by inserting their own identical transaction first, capturing the profit that would have gone to the original searcher. This manipulation extends to back-running (executing after) and sandwich attacks (trading before and after a target transaction).

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected direct pipeline