Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

MEV Classification

MEV Classification is the systematic process of categorizing different types of Maximal Extractable Value (MEV) opportunities based on their underlying mechanics and economic impact.
Chainscore © 2026
definition
BLOCKCHAIN GLOSSARY

What is MEV Classification?

A systematic framework for categorizing the various strategies and impacts of Maximal Extractable Value (MEV) in blockchain ecosystems.

MEV Classification is the systematic categorization of different strategies for extracting Maximal Extractable Value, primarily based on their economic impact, technical execution, and ethical implications within a blockchain's transaction ordering. The primary goal is to create a common taxonomy for developers, researchers, and validators to analyze the complex landscape of value extraction, which ranges from benign arbitrage to harmful sandwich attacks. This classification helps in designing protocols, like proposer-builder separation (PBS), to mitigate negative externalities.

The most fundamental classification splits MEV into good (or non-harmful) and bad (or harmful) categories. Good MEV typically includes DEX arbitrage, which corrects price discrepancies across exchanges, and liquidations in lending protocols, which maintain system solvency. These activities are often seen as providing a useful service to the network. In contrast, bad MEV encompasses attacks that degrade the user experience, such as sandwich attacks that front-run and back-run a victim's trade to extract profit, or time-bandit attacks that attempt to reorganize the blockchain's history.

A more granular technical classification examines the extraction method. This includes time-based strategies (like front-running), state-based strategies (exploiting specific contract states), and consensus-based strategies (manipulating block production). Furthermore, MEV can be classified by actor role: Searchers discover opportunities and craft bundles, Builders aggregate these bundles into blocks, and Proposers (validators) ultimately select which block to propose. Understanding this flow is key to analyzing where value is captured and who benefits.

The evolution of MEV classification is directly tied to the development of mitigation infrastructure. Recognizing the harmful categories of MEV has driven innovation in encrypted mempools, fair ordering protocols, and commit-reveal schemes. By classifying an attack vector, researchers can propose targeted solutions. For instance, classifying sandwich attacks as a form of adversarial ordering leads to solutions that obscure transaction intent or enforce fair ordering rules within a block.

Ultimately, a robust MEV classification system is not just academic; it is a practical tool for ecosystem health. It allows for the measurement of MEV burn (diverting extracted value to be destroyed), the design of more equitable fee markets, and the auditing of validator centralization risks. As layer-2 solutions and new consensus mechanisms emerge, the framework for classification must also adapt to cover cross-domain MEV and the unique opportunities present in optimistic and zk-rollup architectures.

etymology
MEV CLASSIFICATION

Etymology and Origin

The term MEV, or Maximal Extractable Value, has evolved from its original conception as 'Miner Extractable Value' to reflect the broader set of actors who can profit from transaction ordering in modern blockchain systems.

The term MEV originated as Miner Extractable Value, a concept first formally defined in the 2019 paper 'Flash Boys 2.0' by Daian et al. from Cornell University. It described the profit a block producer (specifically, a Proof-of-Work miner) could extract by strategically including, excluding, or reordering transactions within a block they mined. This profit arises from arbitrage opportunities, liquidations, and other forms of value leakage inherent in decentralized applications like decentralized exchanges (DEXs). The original framing centered on the unique power of the miner as the final arbiter of transaction order.

As blockchain ecosystems evolved, particularly with the rise of Proof-of-Stake (PoS) and proposer-builder separation (PBS), the actors capable of extracting this value expanded beyond just miners. In PoS systems like Ethereum, validators propose blocks. Furthermore, with PBS, specialized block builders construct optimized blocks for proposers. Consequently, the term was generalized to Maximal Extractable Value to accurately encompass all entities—builders, validators, and even sophisticated searchers running bots—who can capture value through transaction ordering. This shift in terminology reflects a more precise and systemic understanding of the phenomenon.

The etymology highlights a critical conceptual evolution: MEV is not merely a miner's side income but a fundamental, structural property of permissionless blockchains. It represents the maximum value that can be extracted from a given set of pending transactions, which is then distributed among a network of searchers, builders, and proposers through competitive markets. Understanding this origin is key to analyzing the MEV supply chain and ongoing research into mitigation techniques like fair sequencing services and encrypted mempools, which aim to democratize or neutralize the advantages of centralized transaction ordering.

key-classifications
TAXONOMY

Key MEV Classifications

MEV can be categorized by its economic impact and the technical methods used to extract it. Understanding these classifications is crucial for analyzing network security and protocol design.

01

Arbitrage

The most common form of MEV, where a searcher profits from price differences for the same asset across different DEX pools or markets. This is often considered benign as it helps align prices across the ecosystem.

  • Example: Buying ETH on Uniswap where it's cheaper and instantly selling it on Sushiswap where it's more expensive in the same block.
  • Tools: Searchers use sophisticated bots and flash loans to execute these risk-free trades.
02

Liquidations

Profiting from closing undercollateralized loans in lending protocols like Aave or Compound. Liquidators pay off the bad debt and receive the collateral at a discount as a reward.

  • Process: A searcher's bot monitors loan health, and when the collateral factor drops below the required threshold, it submits a transaction to liquidate the position.
  • Impact: Essential for protocol solvency but creates a competitive, high-speed environment for searchers.
03

Sandwich Trading

A malicious form of MEV where a searcher exploits a visible pending transaction. The attacker places one order before and one after the victim's trade to profit from the induced price movement.

  • Mechanism: 1. Front-run the victim's large buy order with the attacker's own buy. 2. Let the victim's order execute, pushing the price up. 3. Back-run the victim by selling the purchased assets at the higher price.
  • Result: The victim receives worse execution (slippage), and the attacker pockets the difference.
04

Time-Bandit Attacks

A consensus-level attack where a miner or validator reorgs the blockchain to steal MEV that was captured in a previous block. This is one of the most severe forms of MEV as it threatens blockchain finality.

  • How it works: The attacker mines a competing chain in secret, sees a profitable MEV opportunity that was just included in the canonical chain, and then re-mines a block to include that opportunity for themselves.
  • Mitigation: Protocols like Ethereum use proposer-builder separation (PBS) to reduce the incentive for such attacks.
05

Long-Tail MEV

Encompasses a wide variety of niche, opportunistic strategies beyond the major categories. These are often specific to certain protocols or novel DeFi interactions.

  • Examples: NFT MEV (sniping rare mints, arbitraging NFT floor prices), Oracle manipulation (influencing price feeds for profit), Governance attacks (accumulating tokens to influence votes), and Bridge arbitrage (exploiting price differences between L1 and L2).
  • Characteristic: Often less competitive but requires deep protocol-specific knowledge.
06

Classification by Impact

MEV is also categorized by its net effect on network users and health, not just its method.

  • Extractable Value (EV): The broadest term for any value that can be extracted from block production.
  • Negative Externalities: MEV that harms regular users (e.g., sandwich attacks, network congestion from spam).
  • Neutral/Rebated: Value captured by searchers but returned to users via mechanisms like MEV redistribution or CowSwap's batch auctions.
  • Public Good: MEV that is captured and directed to fund protocol development or public goods (e.g., via MEV-Boost relays).
how-classification-works
TAXONOMY

How MEV Classification Works

MEV classification is the systematic categorization of Maximal Extractable Value strategies based on their economic impact, technical execution, and ethical implications for blockchain network participants.

MEV classification organizes extraction strategies into distinct categories to analyze their mechanics and consequences. The primary framework distinguishes between permissionless MEV, which any validator can capture (like arbitrage), and permissioned MEV, which requires privileged access (like a private mempool). Further classification examines the transaction lifecycle stage where value is extracted: in the mempool (pre-execution), during block construction, or through consensus-level manipulation. This taxonomy is essential for developers building mitigation tools and for researchers quantifying network externalities.

Key categories are defined by their economic function and impact on users. Arbitrage corrects price discrepancies across decentralized exchanges within a single block. Liquidations enforce loan collateral requirements in lending protocols. Sandwich attacks exploit predictable trades by placing orders before and after a victim's transaction. Time-bandit attacks involve reordering past blocks—a more complex and potentially chain-reorganizing form of extraction. Each class has distinct profit sources, risk profiles, and implications for transaction finality and network latency.

Classification also considers the execution method and required infrastructure. Strategies range from bundle bidding on a marketplace like Flashbots, to private transaction propagation, to running specialized searcher bots. The searcher-builder-proposer model inherent to Proposer-Builder Separation (PBS) architectures further refines classification by attributing roles in the MEV supply chain. Understanding these technical dimensions helps in designing fair ordering protocols, commit-reveal schemes, and other MEV-aware system safeguards.

The ethical and systemic dimension of classification separates inevitable or benign MEV (e.g., efficient arbitrage) from parasitic or malicious MEV (e.g., sandwich attacks harming end-users). This distinction guides the development of MEV redistribution mechanisms, such as capturing value for protocol treasuries or burning it, and informs regulatory discussions. A precise classification is foundational for creating a transparent and equitable ecosystem where MEV's negative externalities are minimized while its role in market efficiency is preserved.

examples
MEV CLASSIFICATION

Real-World Examples of MEV Types

MEV manifests in distinct patterns based on the strategies and targets used by searchers and validators. These categories illustrate the primary mechanisms for extracting value from blockchain transaction ordering.

01

Arbitrage

The most common form of MEV, where a searcher profits from price discrepancies for the same asset across different liquidity pools or exchanges.

  • Mechanism: A searcher's bot detects a token is priced lower on DEX A than on DEX B. It executes an atomic transaction to buy on A and sell on B, capturing the spread.
  • Example: A stablecoin trading at $0.999 on Uniswap and $1.001 on Curve. The arbitrageur buys on Uniswap and sells on Curve, earning a profit and helping to rebalance prices across the ecosystem.
02

Liquidations

Profiting from the forced closure of undercollateralized loans in lending protocols like Aave or Compound.

  • Mechanism: When a loan's collateral value falls below a required health factor, it becomes eligible for liquidation. Searchers compete to be the first to supply the transaction that repays the debt and receives the collateral at a discount.
  • Example: A user's ETH-backed loan becomes undercollateralized after a price drop. A searcher's bot repays 100 DAI of the debt to claim 105 DAI worth of ETH, earning a 5% liquidation bonus.
03

Sandwich Trading

A predatory form of MEV that targets a pending user transaction with a large trade.

  • Mechanism: The searcher detects a large market order in the mempool. They front-run it by buying the asset first (driving the price up), allow the user's trade to execute at the worse price, and then back-run it by selling the asset (profiting from the inflated price).
  • Impact: This results in slippage and increased cost for the original trader, while the searcher extracts value from the price impact.
04

Time-Bandit Attacks

A malicious form of MEV where a validator reorganizes the blockchain's history to steal profits that were already realized.

  • Mechanism: After a block containing profitable MEV (like a large arbitrage) is published, a validator with sufficient stake can intentionally fork the chain. They produce an alternative block where they include their own transaction to capture that profit instead.
  • Context: This undermines blockchain finality and is considered an attack. It is primarily a theoretical risk on networks with weak consensus finality, mitigated by mechanisms like proposer-builder separation (PBS).
05

Oracle Manipulation

Extracting value by artificially influencing the price data that on-chain oracles (like Chainlink or Uniswap V3 TWAP) report to DeFi protocols.

  • Mechanism: A searcher executes a series of large, manipulative trades on a low-liquidity pool to skew the spot price or time-weighted average price (TWAP). They then trigger a protocol function (e.g., minting a synthetic asset, settling a prediction market) that uses this manipulated price.
  • Example: Temporarily pumping the price of an asset in a pool to mint an overvalued collateralized debt position (CDP).
06

Long-Tail MEV

Opportunities that arise from complex, multi-step interactions with various DeFi primitives, often involving flash loans.

  • Mechanism: Searchers use flash loans to borrow large amounts of capital without collateral, enabling them to execute sophisticated strategies across multiple protocols in a single atomic transaction bundle.
  • Examples Include:
    • NFT MEV: Sniping undervalued NFTs in minting events or exploiting pricing errors in marketplaces.
    • Governance Manipulation: Acquiring voting power temporarily to influence a protocol decision.
    • DeFi Lego Exploits: Combining lending, swapping, and staking actions in novel ways to extract value from protocol fee structures or incentive misalignments.
BY EXTRACTION METHOD

Comparison of Major MEV Classifications

A technical comparison of the primary methods for extracting Miner/Maximal Extractable Value, defined by their operational mechanics and required blockchain access.

Extraction FeatureArbitrageLiquidationsSandwich TradingTime-Bandit Attacks

Core Mechanism

Exploit price differences across DEXs

Trigger undercollateralized loan seizures

Front-run and back-run a victim transaction

Reorg chain to alter transaction ordering

Primary Target

DEX liquidity pools

Lending protocols (e.g., Aave, Compound)

Pending public mempool transactions

Previously confirmed blocks

Required Access

Public mempool

Public mempool or Flashbots bundle

Public mempool

Mining/Staking power (>33%)

Extraction Speed

< 1 second

Seconds to minutes

< 1 second

Multiple block times

Victim Impact

None (price correction)

Loss of collateral for borrower

Slippage loss for trader

Transaction censorship/reversal

Network Impact

Positive (improves price efficiency)

Neutral (enforces protocol health)

Negative (increases user costs)

Severe (compromises chain finality)

Prevalence Post-EIP-1559

High

High

Moderate (reduced by private RPCs)

Very Low (theoretical on Ethereum)

Mitigation Examples

DEX aggregators, MEV-sharing AMMs

Health factor bots, keeper networks

Private transaction relays, SUAVE

Proposer-Builder Separation (PBS), consensus security

security-considerations
MEV CLASSIFICATION

Security and Market Impact Considerations

MEV (Maximal Extractable Value) is not a monolithic force; its classification is essential for understanding its security risks and market impacts. Different types of MEV have distinct actors, incentives, and consequences for network stability and user fairness.

01

Arbitrage

The most common and generally benign form of MEV, where searchers profit from price discrepancies across decentralized exchanges (DEXs) on the same or different blockchains. This activity helps align prices across markets, improving liquidity efficiency.

  • Example: Buying ETH on Uniswap where it's cheaper and instantly selling it on SushiSwap where it's more expensive in the same block.
  • Impact: Generally considered positive for market health, as it reduces arbitrage opportunities and brings markets to equilibrium.
02

Liquidations

A necessary form of MEV that enforces the solvency of lending protocols like Aave and Compound. Searchers compete to repay undercollateralized loans and claim a liquidation bonus, which acts as a keeper reward.

  • Mechanism: Bots monitor loan health and submit transactions to trigger liquidation when collateral value falls below a threshold.
  • Impact: Critical for protocol security, preventing bad debt. However, competition can lead to high gas auctions, increasing network congestion and costs for all users.
03

Sandwich Attacks

A malicious and exploitative form of MEV that targets ordinary users. A searcher front-runs a victim's large DEX trade (placing their own order first) and then back-runs it (selling after), profiting from the price impact the victim's trade creates.

  • Result: The victim receives a worse effective price (slippage), while the attacker profits.
  • Impact: A direct tax on users, reducing trust in decentralized trading. It represents a clear negative externality of public mempools.
04

Time-Bandit Attacks

A severe security threat where a miner or validator re-organizes the blockchain (reorg) to extract value from past blocks. This involves rewriting history to include or exclude certain transactions for profit.

  • Capability: Requires significant hashing power (PoW) or stake (PoS) to execute.
  • Impact: Undermines blockchain finality and settlement guarantees. It is considered one of the most dangerous forms of MEV, as it attacks the core security assumption of immutable history.
05

Long-Term vs. Short-Term

MEV can also be classified by its temporal impact on the network.

  • Short-Term MEV: Includes arbitrage and liquidations. Value is extracted from single-block opportunities. While it can cause congestion, it doesn't fundamentally alter chain state over time.
  • Long-Term MEV: Involves strategic positioning over multiple blocks or epochs. Examples include staking derivatives manipulation or governance attacks to capture future protocol fees. This poses systemic risks to protocol governance and economic security.
06

Protocol vs. Parasitic MEV

A key distinction based on who benefits and whether value creation or extraction dominates.

  • Protocol MEV: Value extracted that aligns with or benefits the protocol's intended function. Examples include liquidation bonuses (enforcing solvency) and DEX fee revenue.
  • Parasitic MEV: Value extracted that provides no net benefit to the protocol or its users and often harms them. Sandwich attacks are the canonical example, representing pure value extraction from users with no compensating benefit.
ecosystem-usage
MEV CLASSIFICATION

Ecosystem Usage and Mitigation

Maximal Extractable Value (MEV) is not monolithic; it manifests in distinct forms with varying impacts on network participants. This section classifies MEV by its primary mechanism and intent, from benign to malicious, and outlines the ecosystem's evolving strategies to manage its effects.

03

Sandwich Attacks

A Sandwich Attack is a malicious form of MEV where a searcher exploits a pending user transaction. The attacker places one transaction before and one after the victim's trade to extract value from the price slippage they create.

  • Process: 1. Front-run: Buy the asset the victim is about to buy, driving its price up. 2. Victim's trade executes at the inflated price. 3. Back-run: Sell the asset immediately after, profiting from the price increase caused by the victim's trade.
  • Result: The victim receives worse execution (negative slippage), and the attacker pockets the difference.
04

Time-Bandit Attacks

Time-Bandit Attacks (or Reorg Attacks) represent a severe, blockchain-level form of MEV extraction. Here, a miner or validator with significant hash/stake power intentionally reorganizes the chain's recent history to steal MEV that was already captured in a previous block.

  • Mechanism: The attacker mines a secret, alternative chain that excludes a profitable MEV transaction. Once they find a chain that allows them to include and claim that value for themselves, they release it, causing the network to reorg to this heavier chain.
  • Impact: This undermines blockchain finality, creates significant centralization pressure, and is considered a direct attack on network security.
FAQ

Common Misconceptions About MEV Classification

Clarifying frequent misunderstandings about how Miner Extractable Value (MEV) and its modern counterpart, Maximal Extractable Value, are categorized and measured in blockchain ecosystems.

No, not all MEV is inherently harmful; it exists on a spectrum from benign to malicious. Benign MEV includes arbitrage that corrects price discrepancies between decentralized exchanges (DEXs) like Uniswap, which improves market efficiency. Malicious MEV, such as frontrunning or sandwich attacks, directly harms end-users by manipulating transaction order for searcher profit. The negative externalities, like network congestion and increased gas fees, are primarily driven by the competition to capture MEV, not by the arbitrage activity itself. Therefore, the classification focuses on the method and impact of extraction, not the existence of profit opportunities.

MEV CLASSIFICATION

Frequently Asked Questions (FAQ)

Maximal Extractable Value (MEV) represents profits extracted by reordering, including, or censoring transactions within a block. This FAQ clarifies its primary classifications, their mechanisms, and their impact on network participants.

Maximal Extractable Value (MEV) is the total value that can be extracted from block production beyond standard block rewards and gas fees by manipulating transaction order, inclusion, or censorship. It is primarily classified into three categories based on its source and impact: Arbitrage, Liquidations, and Sandwich Trading. Arbitrage exploits price differences across decentralized exchanges (DEXs) within a single block. Liquidations involve triggering and profitably fulfilling undercollateralized loans in lending protocols. Sandwich trading is a form of frontrunning that places orders before and after a victim's large trade to profit from the resulting price movement.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
MEV Classification: Types of Blockchain Maximal Extractable Value | ChainScore Glossary