Even @VitalikButerin can't escape the monsters of the dark forest

Twitter wasn't the only party watching Vitalik's wallet. As always bots were ready to extract what value they could from his pending transactions.

Brief recap of those bots and what Vitalik did
Earlier today Vitalik sold his Shibu on Uniswap, and @FrankResearcher documents that adventure well

Normally when you swap on Uniswap the transaction is publicly relayed through nodes until it reaches miners. Due to this anyone who wants to can see the transaction before it is mined.
Bots watch for these transactions before they are mined and try to extract money from them.

This is how "sandwich bots" find their victims.
Here's what a sandwiched transaction looks like:

🥪 gets ahead of it, buying up a token to raise the price for the victim
Victim executes their swap, now getting less tokens but raising the price more
🥪 sells their tokens at the elevated price, pocketing a profit
Alternatively in some cases it makes sense for bots to land right behind a pending transaction and arbitrage away any profit made from potential distortions.

Ethermine's backrunning bot landed an impressive 3 arbs this way, including behind Vitalik's tx

Vitalik had 4 transactions fail at an eye watering ~1000 gwei gas price and was probably mindful of the aforementioned sandwich bots that could making be making his transactions fail.

So what did he do about it?
Recall that bots watch for pending transactions while they are in flight to miners. In order to sandwich a trade it needs to be made public.

So what if transactions were sent directly to miners instead of through full nodes where anyone could see them?
That is the basic premise behind new products like Flashbots, Taichi, MistX, or ArcherSwap: provide a direct line to miners so users can't be frontrun.
Vitalik used ArcherSwap to sell some of his Shibu earlier, and his transaction then succeeded where they had previously failed.

Read more about ArcherSwap in @calebsheridan's tweets below

etherscan.io/tx/0x11730fc49…

ArcherSwap is built using a fork of MEV-Geth and MEV-Relay - two codebases from Flashbots Research.

ArcherSwap routes trades to miners on the Archer Network, which in this case was mined 2miners.
etherscan.io/block/12421138
At Flashbots we're super excited by innovation like this that provides better experiences (e.g. frontrunning protection and creative use cases) and outcomes (better prices) for users.

To get involved check out our Github and Discord here:
github.com/flashbots/pm
Lastly, as @mevalphaleak points out, Vitalik got backrun and not 🥪ed because of how 🥪 ing works.

Since Vitalik was selling Shibu a 🥪 bot would have needed to be holding a ton of Shibu to 🥪 him. As a result, only backrunning was possible.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Robert Miller

Robert Miller Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bertcmiller

13 May
Introducing the Flashbots Dashboard, a collection of real time metrics to give the community transparency on the Flashbots Network:

dashboard.flashbots.net

Thread 👇🏻 Image
In January Flashbots released Flashbots Alpha v0.1, a proof of concept communication channel between miners and users that enables transparent and efficient MEV extraction.

Since then we've seen rapid adoption, and now over 30% of blocks on Ethereum are Flashblocks. Image
Flashbots has two types of direct users today: searchers & miners

Searchers are users who send transactions via Flashbots - today these are mostly bot operators extracting MEV

Miners are the block producers of Ethereum today, who want to extract MEV in a fair & transparent way
Read 11 tweets
12 May
Deleted my tweet about V getting sandwiched, he actually got backrun
This bot backran 3 different shibu transactions in a single block, including Vitalik's

Never seen that before
The plot thickens! The bot that backran Vitalik was actually Ethermine's.

They also run sandwich bots so it's interesting they chose to backrun him instead of sandwiching.
Read 4 tweets
22 Apr
An Ethereum Uncle Bandit strikes again, this time for 145 ETH

However this time the bandit left a trail to their identity, and you'll learn who it is in this MEV story 🧵👇🏻

h/t @AlchemyPlatform for the artwork
If you haven't read about the OG uncle bandit then that would be a good place to start.

I won't repeat all the mechanisms of this attack here, but I made a previous thread on it:


Alchemy also had a good writeup: medium.com/alchemy-api/un…
Our investigation starts with this massive - but otherwise innocuous - Flashbots transaction that has 0 gas price and a payment of 80 ETH to a miner. Makes sense.

It looked at first like someone sniping a new token on Uniswap.
Read 15 tweets
15 Apr
Alright everybody, join me as I relay a heist that took place across blocks yesterday and unveil a novel form of MEV.

Again it will be a long and semi-technical journey but I think it is worth it.
I woke up yesterday to a searcher extremely distraught because apparently only 1 of 3 transactions in their bundle landed on-chain.

What's worse is someone else's transaction seemed to have been added instead of their own.
A quick look and the searcher seemed to be right.

Only the "buy" part of a sandwich bundle they submitted had landed on-chain, and right after that buy someone else had inserted a 7 gas tx arb-ing it

Check the images for a bit more info
Read 22 tweets
11 Apr
If you liked Salmonella you're gonna love this

Last night someone used an *extremely* clever mechanism to take a hundred ETH from sandwich bots

Then a 2nd person jumped in and made 300 MORE ETH by exploiting other sandwich bots

Long thread on how 👇🏻
To understand how this happened you need to know a bit about Flashbots

You can think of Flashbots as a way for users to directly communicate their transaction ordering preferences to to miners via "bundles" of transactions
Instead of users paying transaction fees via gas prices, using Flashbots users pay fees via a smart contract call (block.coinbase.transfer) which transfers ETH to a miner

Here's a screenshot of a random arb that does this, note the 0 gas price & 0.075 ETH transfer to Spark Pool
Read 20 tweets
10 Apr
So this one is interesting! A bot has been backrunning new token listings, effectively paying premium to miners to buy newly listed tokens before anyone else can

And a new token fought back yesterday, trapping the bot for $200k while benefiting from their buy. Here's how 👇🏻
For weeks this bot has been monitoring the Ethereum mempool for new pairs being created on Uniswap. If it finds one it the bot places a buy transaction immediately behind the initial liquidity. That way they can buy a new token before anyone else.
They've been paying miners huge amounts for the right to do this! You can see here a few of the top Flashbots bundles of all time are from this bot. In total they've paid 340 ETH to miners.

Side note: this is from a dashboard Flashbots is making public soon.
Read 13 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(