Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

MEV Capture

MEV Capture is a protocol design strategy that identifies and redirects a portion of Maximal Extractable Value (MEV) generated from its transactions back to the protocol treasury or its token holders.
Chainscore © 2026
definition
BLOCKCHAIN MECHANISM

What is MEV Capture?

MEV Capture refers to the process by which network participants, such as validators, searchers, or protocols, extract the Maximum Extractable Value (MEV) generated from transaction ordering within a blockchain.

MEV Capture is the active extraction of value from the ability to add, remove, or reorder transactions in a block. This value, known as Maximum Extractable Value (MEV), arises from inefficiencies and arbitrage opportunities inherent in decentralized markets. The primary actors in MEV capture are searchers, who run sophisticated algorithms to identify profitable opportunities, and validators (or block producers), who have the ultimate authority to include and order transactions in a block. The relationship between these actors defines the MEV supply chain.

The mechanics of capture depend heavily on the blockchain's consensus and block production model. In Proof-of-Work and basic Proof-of-Stake systems, validators traditionally capture MEV by executing profitable transactions themselves or by accepting bribes from searchers via channels like Flashbots' MEV-Geth. This creates a centralized and opaque market. In contrast, more advanced designs like proposer-builder separation (PBS) formalize this market: specialized block builders compete to create the most valuable blocks (packed with MEV) and bid for the right to have their block proposed by a validator, creating a more transparent and competitive auction.

Protocols and users have developed strategies to mitigate the negative externalities of MEV capture, such as frontrunning and network congestion. MEV auctions (e.g., CowSwap's CowProtocol) and fair ordering protocols attempt to democratize access. Furthermore, the rise of MEV sharing or MEV smoothing mechanisms, like those proposed in Ethereum's PBS design, aim to redistribute a portion of captured MEV back to all network stakeholders, transforming a potential threat into a sustainable source of staking yield and network security.

how-it-works
MECHANISM

How MEV Capture Works

MEV capture is the process by which network participants extract value from the reordering, insertion, or censorship of transactions within a block.

MEV capture is the execution of a strategy to extract value from the ability to influence the composition and order of transactions in a blockchain block. This process is typically performed by validators (in Proof-of-Stake) or miners (in Proof-of-Work), who have the unilateral right to construct blocks, or by sophisticated bots known as searchers who submit transaction bundles to these block producers. The core mechanism involves identifying and exploiting inefficiencies or predictable outcomes within the mempool, such as arbitrage opportunities between decentralized exchanges or the liquidation of undercollateralized loans.

The technical workflow involves several key actors. Searchers run complex algorithms to scan pending transactions for profitable opportunities. When one is found, they craft a specialized transaction or bundle designed to capture that value. This bundle is then sent to a block builder or directly to a validator, often via a private relay or an auction mechanism like a MEV-Boost auction on Ethereum. The validator includes the profitable bundle in their block proposal, and the captured value—the MEV—is shared between the searcher and the validator according to pre-arranged terms, often with a portion going to a relay operator as a fee.

Common MEV capture strategies include: DEX arbitrage, buying an asset on one exchange and instantly selling it on another for a higher price; liquidations, repaying a user's undercollateralized debt on a lending protocol to claim a liquidation bonus; and sandwich attacks, where a searcher places transactions both before and after a victim's large trade to profit from the resulting price slippage. These strategies are automated and executed at blockchain speed, making the competition for MEV extremely fierce.

The ecosystem has evolved to institutionalize this capture. MEV-Boost is a prominent example, creating a competitive marketplace where specialized block builders auction the right to fill a validator's block space. This separates the roles of block proposal and block building, generally leading to more efficient MEV extraction and higher validator rewards. However, it also centralizes block construction power among a few sophisticated builders, raising concerns about network censorship and resilience.

The impact of MEV capture is dual-sided. It provides a significant source of revenue for validators, helping to secure the network by increasing the economic cost of attack. Conversely, it imposes a tax on users through worse execution prices (e.g., sandwich attacks) and increased network congestion. The ongoing development of proposer-builder separation (PBS) and encrypted mempools aims to mitigate its negative externalities by making transaction ordering more fair and transparent, while still allowing for the efficient extraction of benign arbitrage MEV.

key-features
MECHANISMS & STRATEGIES

Key Features of MEV Capture

MEV capture refers to the methods and systems by which value extracted from blockchain transaction ordering is secured and distributed. These are the primary mechanisms and their characteristics.

01

Frontrunning

The practice of placing a transaction immediately before a known pending transaction to profit from its anticipated market impact. This is a classic adversarial strategy.

  • Example: Seeing a large DEX trade about to execute and placing a buy order for the same asset ahead of it, then selling after the price moves.
  • Tools: Bots use mempool snooping to detect profitable opportunities.
02

Backrunning

Placing a transaction immediately after a target transaction to capitalize on the state changes it creates, often with lower risk.

  • Example: Executing an arbitrage trade right after a large DEX swap that creates a price imbalance.
  • Common Use: Liquidation bots backrun price updates to liquidate undercollateralized loans.
03

Sandwich Attacks

A specific, two-transaction form of frontrunning that "sandwiches" a victim's trade. The attacker buys the asset before the victim's trade (driving price up) and sells after it (profiting from the inflated price).

  • Impact: Increases slippage and cost for the victim.
  • Defense: Using private transaction relays or commit-reveal schemes.
04

Arbitrage

Exploiting price differences for the same asset across different venues (e.g., DEXs, CEXs). This is often considered a "beneficial" form of MEV as it improves market efficiency.

  • Types: Cross-DEX arbitrage, CEX-DEX arbitrage.
  • Execution: Requires fast bots to spot discrepancies and execute before prices converge.
05

Liquidations

Triggering the forced closure of undercollateralized loans in lending protocols (e.g., Aave, Compound) to collect a liquidation bonus.

  • Process: Bots monitor oracle price updates and compete to be the first to submit the liquidation transaction.
  • Value: A critical, system-stabilizing form of MEV that maintains protocol solvency.
06

Time-Bandit Attacks

A historical attack vector where miners/validators reorg the chain to capture MEV from past blocks. This undermines blockchain finality.

  • Mechanism: The validator secretly mines an alternative chain branch that includes profitable MEV transactions, then releases it to overtake the canonical chain.
  • Mitigation: Enhanced by proposer-builder separation (PBS) and consensus-layer fixes.
examples
TACTICS AND STRATEGIES

Examples of MEV Capture in Practice

MEV is extracted through specific, automated strategies that exploit opportunities in transaction ordering and execution. These are the primary methods used by searchers and validators.

01

Arbitrage

The most common form of MEV, where a searcher profits from price differences for the same asset across different decentralized exchanges (DEXs) or liquidity pools. A searcher detects the discrepancy and submits a transaction bundle to buy low on one venue and sell high on another in the same block.

  • Example: Buying ETH on Uniswap for $3,000 and selling it on SushiSwap for $3,010 within a single atomic transaction.
02

Liquidations

Searchers compete to be the first to trigger the liquidation of an undercollateralized loan in DeFi lending protocols like Aave or Compound. The first successful liquidation transaction earns a liquidation bonus or fee. This is considered 'good' MEV as it maintains protocol solvency.

  • Searchers run bots monitoring loan health.
  • They pay high priority fees (tips) to ensure their transaction is included first.
03

Sandwich Trading

A predatory form of MEV where a searcher exploits a pending DEX swap from a regular user. The searcher's bot:

  1. Front-runs the user's large swap, buying the asset first.
  2. The user's swap executes, pushing the price up due to slippage.
  3. The searcher back-runs the user, selling the asset at the higher price. This results in a guaranteed profit for the searcher and worse execution for the user.
04

Time-Bandit Attacks

A sophisticated and potentially malicious form of MEV capture where a validator or miner reorganizes the blockchain itself. After a block is produced, the validator privately mines alternative blocks to reorg the chain and capture MEV opportunities that existed in the original block's mempool. This undermines blockchain finality and is a significant security concern, especially in Proof-of-Work systems.

05

NFT MEV

Exploiting opportunities in NFT marketplaces. Common strategies include:

  • Floor Sweeping: Sniping multiple NFTs listed below market price in a single block when a collection's floor price suddenly rises.
  • Trait Sniping: Identifying and purchasing mispriced NFTs with rare traits before listings are updated.
  • Bidding Games: Manipulating or front-running bids on NFT auction platforms like Sudoswap.
06

Long-Tail MEV

Profiting from complex, multi-step DeFi interactions beyond simple arbitrage. This involves bundling transactions that interact with several protocols to capture value from:

  • Interest rate differentials between protocols.
  • Governance vote outcomes.
  • Oracle price update delays.
  • Bridge arbitrage between different blockchains. These strategies require deep protocol knowledge and sophisticated simulation.
design-considerations
MEV CAPTURE

Protocol Design Considerations

This section examines the architectural decisions and economic mechanisms that determine how value extracted from transaction ordering—known as Maximal Extractable Value (MEV)—is distributed and managed within a blockchain protocol.

MEV capture refers to the process by which a blockchain protocol or its participants systematically extract and redistribute the value created by the ability to influence transaction ordering. This is a fundamental design consideration that moves beyond merely acknowledging MEV's existence to actively shaping its economic and security outcomes. The core question is whether this value accrues to validators and searchers in a permissionless free-for-all, is captured by the protocol itself for public benefit, or is mitigated to reduce its negative externalities. The chosen strategy directly impacts network security, user experience, and decentralization.

Protocols can approach MEV capture through several key mechanisms. Proposer-Builder Separation (PBS) is a leading design that formally separates the role of block building (complex MEV extraction) from block proposing (consensus). This allows specialized builders to compete for MEV and bid for block space, with the winning bid paid to the proposer. Other approaches include in-protocol ordering rules (e.g., first-come-first-served mempools), encrypted mempools to hide transaction intent, and MEV redistribution mechanisms like MEV smoothing or MEV burn, which aim to distribute rewards more evenly among validators or destroy them to benefit all token holders.

The implications of MEV capture strategies are profound for protocol security. When MEV rewards are large and concentrated, they can incentivize validator centralization and the rise of dominant block builders, potentially threatening censorship resistance. Conversely, protocols that successfully capture and redistribute MEV can use it to subsidize staking yields, enhancing security budgets. Furthermore, the design dictates the user experience; a transparent auction model like PBS may lead to more efficient pricing, while encrypted mempools can protect users from frontrunning but may reduce liquidity and efficiency.

Real-world implementations illustrate the spectrum of design choices. Ethereum's adoption of PBS via mev-boost outsources block building to a competitive market, capturing value for stakers. Cosmos chains often feature a native order book design where MEV is captured by arbitrageurs within the application logic itself. Flashbots' SUAVE envisions a decentralized block-building network as a shared resource across chains. Each model presents trade-offs between efficiency, fairness, and complexity, making MEV capture a central pillar of modern cryptoeconomic design.

ecosystem-usage
MEV CAPTURE

Ecosystem Context & Adoption

MEV capture refers to the strategies and mechanisms by which network participants extract and redistribute the value created by Maximal Extractable Value (MEV). This section examines the evolving ecosystem of tools, protocols, and economic models built around this phenomenon.

01

Searcher-Builder-Proposer (SBP) Model

The dominant modern framework for MEV capture, separating roles for efficiency and decentralization. Searchers identify profitable opportunities and submit transaction bundles. Builders compete to construct the most valuable block from these bundles. Proposers (validators) select the highest-paying block header. This specialization allows for sophisticated MEV auctions and reduces the need for validators to run complex infrastructure.

03

MEV Redistribution & PBS

A core goal of modern MEV research is equitable value redistribution through Proposer-Builder Separation (PBS). PBS is a protocol-level design that enforces the separation of block building and proposing. This aims to:

  • Democratize access: Prevent centralization of MEV profits among sophisticated validators.
  • Enforce credibly neutral rules: Ensure block builders cannot censor transactions.
  • Enable MEV smoothing: Protocols like MEV-Share and MEV-Burn explore redistributing captured value back to users or burning it to benefit all token holders.
04

Cross-Chain & L2 MEV

MEV capture strategies have expanded beyond Ethereum L1 to Layer 2s and other chains, each with unique dynamics.

  • Optimistic Rollups: Long challenge periods create unique time-bandit attacks and cross-L1/L2 arbitrage opportunities.
  • ZK-Rollups: Faster finality changes the MEV game, but sequencing rights remain valuable.
  • Solana & High-Throughput Chains: Extremely low latency creates a premium on Jito-style searcher infrastructure and private mempools for arbitrage and liquidations.
05

Regulatory & Ethical Considerations

The capture of MEV exists at the intersection of technology, economics, and regulation.

  • Regulatory scrutiny: Activities like frontrunning and sandwich attacks may attract attention as potential market manipulation.
  • Decentralization risks: The concentration of block building power in a few entities poses systemic risks.
  • Ethical design: Projects are increasingly focused on fair ordering protocols and MEV minimization techniques to protect end-users from predatory extraction.
security-considerations
GLOSSARY TERM

Security & Economic Considerations

MEV Capture refers to the strategies and mechanisms by which network participants extract value from the reordering, inclusion, or exclusion of transactions within blocks.

01

What is MEV?

Miner/Maximal Extractable Value (MEV) is the total value that can be extracted from block production beyond standard block rewards and gas fees, by reordering, including, or censoring transactions. It arises from the inherent power of block proposers to determine transaction order.

  • Sources: Arbitrage, liquidations, front-running, sandwich attacks.
  • Impact: Can lead to network congestion, increased gas fees, and degraded user experience.
02

Who Captures MEV?

Value extraction is a multi-party game involving several key actors in the blockchain ecosystem.

  • Validators/Proposers: The primary captors, as they have the final say on block content. They can run their own strategies or sell block space.
  • Searchers: Independent actors who run complex algorithms to detect MEV opportunities and submit transaction bundles.
  • Builders: Specialized nodes that construct optimized blocks (often containing MEV bundles) for proposers.
03

Common Capture Strategies

MEV is captured through specific on-chain strategies that exploit price differences or pending transactions.

  • Arbitrage: Profiting from price discrepancies of the same asset across different DEXs.
  • Liquidations: Triggering undercollateralized loan liquidations and claiming the liquidation fee.
  • Sandwich Attacks: Placing transactions before and after a victim's large trade to profit from the resulting price movement.
04

Economic & Security Risks

Unchecked MEV extraction poses significant risks to network health and fairness.

  • Centralization Pressure: High MEV rewards incentivize validator centralization into large, sophisticated pools.
  • Chain Reorgs: Proposers may be incentivized to re-organize the chain to capture MEV, undermining finality.
  • User Harm: Front-running and sandwich attacks directly extract value from regular users' transactions.
05

Mitigation: Proposer-Builder Separation (PBS)

A protocol-level design to mitigate MEV's negative externalities by separating block building from block proposal.

  • Builder Role: Competes to create the most valuable block (including MEV).
  • Proposer Role: Simply selects the highest-value block from builders.
  • Benefit: Reduces centralization pressure on validators and can make MEV extraction more transparent and competitive.
COMPARATIVE ANALYSIS

MEV Capture vs. Related Concepts

A breakdown of how MEV capture differs from adjacent concepts in the blockchain ecosystem, focusing on intent, mechanism, and primary actors.

Concept / FeatureMEV CaptureMEV ExtractionMEV Redistribution

Primary Objective

To secure and profit from the ordering of transactions within a block.

To identify and execute profitable transaction ordering opportunities.

To mitigate negative externalities by returning extracted value to users.

Core Mechanism

Block production and proposal (e.g., via Proposer-Builder Separation).

Transaction ordering, frontrunning, and arbitrage bots.

Protocol-level mechanisms like auctions or burn (e.g., EIP-1559).

Key Actor

Block proposer (validator) or specialized block builder.

Searcher (bot operator) or arbitrageur.

Protocol designers or the network itself (via fees).

Value Flow

Value accrues to the block proposer/builder as a reward.

Value is extracted from regular users by the searcher.

Value is redirected from extractors back to users or token holders.

User Impact

Indirect; can lead to higher base fees and transaction latency.

Direct; causes failed transactions and worse execution prices.

Positive; aims to reduce net loss for end-users.

Protocol Examples

Proposer-Builder Separation (PBS), MEV-Boost.

Flashbots bundles, generalized frontrunning bots.

EIP-1559 base fee burn, CowSwap solver competition.

Is it Inherent?

Requires Consensus Change?

Often (e.g., for enshrined PBS).

Sometimes (e.g., for fee burn mechanics).

evolution
FROM THEORY TO PROTOCOL

Evolution of the Concept

The conceptualization of MEV capture has evolved from an abstract economic observation into a structured field of protocol design and market infrastructure.

The concept of MEV capture originated from the theoretical recognition that block producers (miners or validators) could extract value by manipulating transaction ordering within a block. Initially documented in 2014 by researchers like Ittay Eyal and Emin Gün Sirer in their "Majority is not Enough" paper, this was seen as a potential attack vector. The term Miner Extractable Value (MEV) was later formalized in 2019 by Phil Daian and colleagues, framing it not as a bug but as an inevitable byproduct of permissionless blockchains where transaction sequencing is a scarce resource. This reframing shifted the discourse from pure security to one of economic design and distribution.

The evolution accelerated with the rise of DeFi and on-chain arbitrage, where sophisticated actors (searchers) began using bots to identify and bid for profitable transaction ordering opportunities. This created a competitive, off-chain marketplace for block space, leading to negative externalities like network congestion and frontrunning for ordinary users. The realization that this value flow was largely captured by a few centralized actors spurred the development of MEV-aware protocol designs. The goal shifted from mere observation to creating systems that could democratize, redistribute, or socialize the value extracted from transaction ordering.

A pivotal development was the proposal and implementation of PBS (Proposer-Builder Separation), most notably in Ethereum's post-merge roadmap. PBS formally separates the role of the block proposer (who chooses the final block) from the block builder (who assembles transactions and extracts MEV). This creates a competitive builder market, theoretically leading to more efficient MEV extraction and allowing proposers to capture value via open auctions. Protocols like Flashbots' SUAVE aim to extend this model into a decentralized, cross-chain block-building network, further institutionalizing MEV capture as a core layer of blockchain infrastructure.

The concept continues to evolve with new mechanisms for managing MEV, such as encrypted mempools to reduce predatory frontrunning, MEV smoothing protocols to distribute rewards more evenly among validators, and application-layer solutions like CowSwap that use batch auctions to neutralize frontrunning. The trajectory is clear: MEV capture is transitioning from a wild-west, adversarial game into a structured subsystem with its own markets, standards (like the MEV-Boost relay architecture), and economic guarantees, fundamentally reshaping how value flows at the base layer of blockchain networks.

MAXIMAL EXTRACTABLE VALUE

Frequently Asked Questions (FAQ)

Common questions about the mechanisms, risks, and ecosystem surrounding Maximal Extractable Value (MEV).

Maximal Extractable Value (MEV) is the maximum profit that can be extracted from block production on a blockchain by including, excluding, or reordering transactions within a block. It works because validators or miners, who have the sole right to propose a block, can strategically manipulate the transaction order to capture value from opportunities like arbitrage, liquidations, and sandwich attacks. This process often involves specialized bots that scan the mempool for profitable transaction sequences and pay higher fees (priority gas auctions) to ensure their bundles are included by the block producer.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
MEV Capture: Definition & Protocol Strategy | ChainScore Glossary