Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

MEV Share Protocol

A protocol that enables the partial or conditional sharing of MEV opportunities or profits between users, searchers, and validators.
Chainscore © 2026
definition
BLOCKCHAIN INFRASTRUCTURE

What is MEV Share Protocol?

MEV Share Protocol is a permissionless, open-source protocol designed to democratize access to Miner/Maximal Extractable Value (MEV) by enabling users to share transaction information with searchers in a trust-minimized way.

The MEV Share Protocol is a set of smart contracts and off-chain infrastructure that creates a transparent marketplace for MEV opportunities. It allows regular users to signal their transaction intent to a network of competitive searchers (specialized bots) by submitting transactions to a public mempool. In return for revealing their transaction flow, users receive a guaranteed share of any MEV profits generated from bundling their transactions, a process known as backrunning or coincidence of wants. This shifts value from exclusive, private mempools back to the public domain and its users.

At its core, the protocol operates on a commit-reveal scheme. A user's transaction is first submitted as an intent, containing encrypted details. Searchers then compete to propose the most profitable bundle that includes this intent. Once a winning bundle is selected by the protocol's block builder, the user's transaction details are revealed and executed on-chain. This mechanism ensures user privacy during the auction while enabling fair competition. The protocol is often integrated with a Flashbots SUAVE-enabled block builder to ensure credible neutrality and censorship resistance.

Key technical components include the User Operation model for expressing intents, a Searcher API for submitting bundles, and smart contracts that enforce the auction rules and distribute payments. A critical innovation is the use of conditional transactions, where a searcher's profit is contingent on the user's transaction succeeding, aligning incentives. The protocol also introduces the concept of MEV-Share orders, which are standardized structures for different MEV opportunities like arbitrage or liquidations.

The primary benefit is the redistribution of MEV from professional searchers and validators to everyday Ethereum users. By participating, users can receive gas subsidies or even direct payments, effectively reducing their net transaction costs. For the ecosystem, it promotes MEV democratization, increases transparency by reducing opaque private transaction flow, and can help mitigate negative externalities like time-bandit attacks by making certain MEV opportunities less predictable and exclusive.

The protocol represents a significant evolution from earlier MEV mitigation systems like Flashbots Auction. While Flashbots protected users from frontrunning, MEV Share actively enables them to profit from the inevitable MEV their transactions create. It is a foundational primitive for a more equitable MEV supply chain, paving the way for applications where users can automatically opt into sharing value from their DeFi interactions, NFT trades, or other on-chain actions.

how-it-works
MECHANISM

How the MEV Share Protocol Works

An overview of the MEV Share protocol's architecture, which redistributes value from Maximal Extractable Value (MEV) by allowing users to share transaction details with searchers.

The MEV Share Protocol is a permissionless, open-source system built on Ethereum that introduces a new transaction flow to democratize access to MEV (Maximal Extractable Value). At its core, it allows users to opt into sharing partial details of their pending transactions—specifically the transaction calldata and the hash of the address—with a network of competitive searchers via a shared mempool. This creates a marketplace where searchers can craft bundles that include these user transactions alongside their own profit-extracting logic, competing to offer the best backrun or other MEV opportunities back to the user in the form of enhanced transaction execution, such as fee refunds or direct payments.

The protocol's operation relies on a specialized entity called the Matchmaker, which is operated by Flashbots. The Matchmaker receives user-intent transactions, strips them of sensitive information like the full sender address to preserve privacy, and broadcasts these sanitized intents to searchers. Searchers then analyze these intents and submit their proposed bundles, which must include the original user transaction, back to the Matchmaker. The Matchmaker evaluates all incoming bundles against a set of rules, selecting the one that provides the maximum economic benefit for the user. The winning bundle is then forwarded to a block builder for inclusion in the next Ethereum block.

A key innovation of MEV Share is its use of commit-reveal schemes and conditional transaction logic to ensure fairness and security. User transactions can include a conditional flashbots directive that specifies requirements for their execution, such as a minimum payment from the searcher. The searcher's bundle, which fulfills these conditions, is only revealed and executed if it lands in a canonical block. This mechanism prevents frontrunning and guarantees that users only transact under their specified, improved terms, effectively allowing them to 'sell' the option value of their transaction's predictable outcome to the highest bidder in the MEV marketplace.

By design, MEV Share creates a more equitable distribution of the value extracted from blockchain activity. Instead of searchers and validators capturing all MEV through techniques like sandwich attacks, a portion is returned to the end-user who initiated the opportunity. This realigns economic incentives, reduces the negative externalities of toxic MEV, and enhances the overall user experience by potentially lowering net transaction costs. The protocol represents a shift from opaque extraction to a transparent, auction-based system where value is shared.

key-features
PROTOCOL MECHANICS

Key Features of MEV Share

MEV Share is a protocol that enables users to capture value from their transaction flow by exposing it to a competitive market of searchers, while maintaining privacy and control.

01

User Intent & Bundle Auctions

Users submit transactions with a signed user intent, which includes a desired outcome and a backrun bounty for searchers. The protocol packages this intent into a bundle and auctions it to a permissionless network of searchers. The winning searcher's bundle, which must satisfy the user's intent, is included in the next block, with the backrun bounty paid to the user.

02

Privacy via Encrypted Mempool

To prevent frontrunning, user intents are not broadcast publicly. Instead, they are sent to an encrypted mempool where only hashes are visible. Searchers submit commitments to their proposed bundles. After a delay, the full transaction details are revealed, allowing for bundle validation and execution without exposing the user's strategy prematurely.

03

Expressiveness & Conditional Logic

User intents can specify complex conditions, making the protocol highly expressive. Key parameters include:

  • Backrun Bounty: The minimum payment the user must receive.
  • Inclusion List: A set of addresses that must be included in the resulting bundle.
  • Exclusion List: A set of addresses that must not appear.
  • Max Block Number: A deadline for execution.
04

Value Redistribution (PBS)

MEV Share implements a form of proposer-builder separation (PBS). Builders (block producers) run auctions for the bundles created by searchers. The winning builder pays the backrun bounty to the user and a fee to the searcher, capturing the remaining MEV for themselves. This creates a competitive market that maximizes value returned to the transaction originator.

05

Permissionless Searcher Network

Any entity can participate as a searcher by connecting to the MEV Share node. Searchers compete in real-time auctions by constructing optimal bundles that satisfy user intents. This open network fosters competition, driving efficiency and ensuring users receive competitive bids for the value of their transaction flow.

etymology-origin
PROTOCOL GENESIS

Origin and Etymology

The MEV Share Protocol emerged as a direct evolution of the MEV-Boost ecosystem, designed to redistribute the value extracted from blockchain transactions.

The MEV Share Protocol was developed by Flashbots, the same research and development collective that created the pivotal MEV-Boost middleware for Ethereum validators. Its name derives from its core function: to enable the "sharing" of Maximal Extractable Value (MEV) opportunities and their profits among a broader set of participants, primarily transaction senders and searchers, rather than concentrating them solely with block proposers. This represented a philosophical shift from MEV-Boost's focus on fair access to block space (who builds the block) to a model focused on fair value distribution (who benefits from the value in the block).

Etymologically, the protocol's name is a compound of the foundational concept MEV and the action Share. It formalizes the idea of a transaction flow marketplace where users can intentionally expose their transaction intents—through mechanisms like calldata hints or conditional bundles—to competitive searchers. This design creates an auction for transaction inclusion and ordering that occurs before a block is built, allowing users to capture a portion of the MEV their transactions generate in the form of refunds or direct payments, a concept often termed MEV rebates.

The protocol's architecture is a direct descendant of Flashbots' earlier work on the searcher-builder-proposer separation model. It essentially extends the communication layer of MEV-Boost, introducing new message types and rules for a confidential mempool. This allows transactions with shared hints to be visible only to registered searchers within the Flashbots network, protecting them from frontrunning on the public mempool while still enabling competitive bidding for the right to include and order them alongside profitable arbitrage or liquidation bundles.

A key historical driver for MEV Share's development was the growing scrutiny on the negative externalities of MEV, such as sandwich attacks against ordinary users. By providing a structured, transparent channel for value redistribution, the protocol aims to align incentives, making predatory strategies less profitable relative to cooperative ones. Its launch marked a significant experiment in using market design to mitigate a core cryptographic-economic problem, evolving the Ethereum ecosystem from merely managing MEV towards democratizing its proceeds.

core-components
MEV-SHARE PROTOCOL

Core Protocol Components

MEV-Share is a protocol that enables Ethereum users to selectively reveal their transaction information to searchers, creating a competitive marketplace for MEV extraction that returns a portion of the profits back to users.

01

User Intent & Order Flow

The protocol's foundation is user-specified intent. Users sign transactions with a special flag that allows them to control what data is shared. They can choose to reveal their transaction's calldata, contract address, or function selector to searchers while keeping their address private via a commitment. This controlled order flow is the raw material for the MEV auction.

02

Searcher Competition & Backrun Bundles

Searchers monitor the shared intent stream and compete to build the most profitable bundles. A typical strategy is a backrun: a searcher observes a pending swap transaction, calculates the optimal arbitrage or liquidation opportunity it creates, and submits a bundle containing both the user's transaction and their own profitable one to a builder. The protocol ensures the user's transaction is included.

03

Trusted Builder & Encrypted Mempool

To prevent theft-of-MEV, user transactions and searcher bundles are sent to a trusted builder (like Flashbots SUAVE) via an encrypted mempool. This prevents other network participants from frontrunning the searcher's bundle. The builder decrypts the transactions, constructs the block, and submits it to the network, ensuring the agreed-upon transaction order is preserved.

04

Payment Redistribution & Rebates

A core innovation is redistributing MEV profits. When a searcher's bundle wins, the protocol automatically splits the payment. A portion goes to the block builder/validator as a tip, and a significant portion is sent back to the original user as a rebate or refund. This transforms users from passive MEV victims into active participants who capture value.

05

Integration Hook & Event Listening

Applications integrate via a hook that listens for the TransactionReceived event emitted by the MEV-Share node. This allows wallets (like MetaMask via the Flashbots Protect RPC) or dApps to seamlessly route user transactions through the protocol. The hook manages the signing of the special intent data and submission to the encrypted channel.

examples-implementations
MEV SHARE ECOSYSTEM

Examples and Implementations

MEV-Share is implemented through a network of specialized infrastructure components and real-world applications that demonstrate its core principles of order flow transparency and conditional execution.

03

Searcher Strategies & Bots

Searchers build specialized bots that subscribe to the matchmaker's SSE stream of hinted transactions. Common strategies include:

  • Backrunning: Profiting from large DEX swaps by executing an arbitrage or liquidation in the same block.
  • Conditional Limit Orders: Filling a user's DEX limit order only if the market reaches their specified price, with the searcher taking a fee.
  • NFT Mint Snipping: Using hints about an NFT contract address to efficiently discover and bid on new mints. These bots compete in a sealed-bid auction for bundle inclusion.
04

The Matchmaker & Relay

The matchmaker is the central coordination server run by Flashbots. It:

  • Receives hinted transactions from the RPC.
  • Broadcasts a sanitized event stream (without private data) to registered searchers.
  • Accepts bundles from searchers that reference these transactions.
  • Validates bundle rules and runs a first-price sealed-bid auction.
  • The winning bundle is forwarded to the Flashbots relay, which sends it to builders for block construction.
06

Key Protocol Parameters

The system's behavior is governed by tunable parameters that balance privacy, efficiency, and incentive alignment:

  • Hint Preferences: Users/RPCs define what data is shared (hash, calldata, logs, function_selector, contract_address).
  • Minimum Bid: The lowest acceptable payment from a searcher to the user for a backrun (e.g., 90% of MEV).
  • Refund Percent: The portion of the searcher's failed bundle bid that is refunded.
  • Block Range: How many future blocks a bundle can target for execution.
security-considerations
MEV SHARE PROTOCOL

Security and Trust Considerations

MEV-Share is a protocol designed to redistribute the value of Maximal Extractable Value (MEV) by allowing users to share their transaction intents with searchers in a privacy-preserving way. This introduces unique security and trust trade-offs compared to standard transaction submission.

01

Intent Privacy & Information Leakage

MEV-Share uses a commit-reveal scheme and blinded bundles to protect user intent. However, the protocol's security model relies on users trusting the relay not to leak information before the reveal phase. A malicious relay could front-run user transactions by exploiting its privileged view of pending intents, creating a central point of failure for privacy.

02

Trust in the Relay Operator

The relay is a critical, trusted component that orders transactions and bundles. Users and searchers must trust that the relay:

  • Will not censor transactions.
  • Will correctly enforce the rules of the auction (e.g., partial order fairness).
  • Will not steal funds or manipulate the bundle execution. This reintroduces a form of consensus-level trust that decentralized block building aims to eliminate.
03

Searcher Collusion & Cartel Formation

By revealing transaction flow to a competitive marketplace of searchers, MEV-Share aims to improve efficiency. However, it can also facilitate collusion. Searchers could form cartels to:

  • Suppress bidding, reducing backrun payments returned to users.
  • Coordinate to exclude new entrants.
  • Engage in time-bandit attacks if they gain enough influence over block production.
04

Bundle Validity & Execution Guarantees

Users receive a conditional guarantee: payment only if their transaction is included in a winning searcher's bundle and that bundle lands on-chain. They face execution risk from:

  • Bundle failure: A searcher's bundle reverts, causing the user's tx to fail without payment.
  • Network congestion: The searcher's bundle loses the block auction.
  • Builder/Validator misconduct: The winning builder or validator excludes the user's transaction from the final block.
05

Regulatory & Compliance Surface

The explicit creation of a marketplace for transaction order flow introduces new regulatory considerations. Key questions include:

  • Does the returned MEV share constitute a security or other regulated instrument?
  • What are the AML/KYC obligations for relay operators or bundlers facilitating payments?
  • Could the protocol be seen as enabling insider trading on non-public transaction information, even if blinded?
PROTOCOL ARCHITECTURE

MEV Share vs. MEV-Boost: A Comparison

A technical comparison of two major protocols for managing MEV (Maximal Extractable Value) on Ethereum, focusing on their core mechanisms and user impact.

Feature / MetricMEV-BoostMEV Share

Primary Function

Out-of-block builder marketplace for proposers

In-protocol order flow auction for users

User Benefit

Indirect via improved block rewards

Direct via order flow refunds (rebates)

Transaction Privacy

Full transaction data exposed to builders

Partial encryption via conditional order flow

Integration Point

Consensus layer (proposer-builder separation)

Execution layer (smart contract)

Backrunning Protection

Key Architectural Component

Relay network

Searcher-Builder API & Flashbots SUAVE

Primary Goal

Decentralize block production, increase validator revenue

Democratize MEV, return value to users

MEV SHARE PROTOCOL

Frequently Asked Questions (FAQ)

Essential questions and answers about the Flashbots MEV-Share protocol, its mechanics, and its role in the MEV supply chain.

MEV-Share is a protocol that facilitates a trustless information market between users (searchers and builders) and Ethereum validators. It works by allowing users to submit transaction hints—partial details about a pending transaction—to a network of builders via a relay. Builders use these hints to construct more profitable blocks by bundling the hinted transactions with others, and a portion of the extracted Maximal Extractable Value (MEV) is returned to the original user as a rebate or refund.

Key Components:

  • User: Submits a transaction with hints (e.g., calldata, logs).
  • Relay: Receives hinted bundles from users and full bundles from builders.
  • Builder: Constructs a block using the hints to create profitable arbitrage or liquidations.
  • Validator: Proposes the most profitable block received from the builder.
ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team
MEV Share Protocol: Definition & How It Works | ChainScore Glossary