mirror of
https://github.com/autistic-symposium/mev-toolkit.git
synced 2025-05-22 08:21:22 -04:00
Update README.md
This commit is contained in:
parent
a60868fa0c
commit
de8cea15d4
1 changed files with 3 additions and 15 deletions
|
@ -4,27 +4,15 @@
|
|||
|
||||
### tl, dr
|
||||
|
||||
* predict trade opportunities that will mine into a future block by pushing another user’s trade opportunity to its max slippage limit, which will result in an arbitrage opportunity at a later time (typically within the same block).
|
||||
* sandwiching occurs when a searcher identifies a profitable trade in the mempool that will cause an impact on the price of an asset.
|
||||
|
||||
* sandwiching is a common situation that occurs when a searcher identifies a large trade in the mempool that will cause an impact on the price of an asset.
|
||||
* a searcher buys or sells a calculated amount directly before the large trade is executed and then immediately exits their position after the large order has taken place, banking a profit.
|
||||
|
||||
* the searcher buys or sells a calculated amount directly prior to the large trade being executed and then immediately exits their position after the large order has taken place, banking a nice profit.
|
||||
* the main theme of sandwich attacks is slippage caused by available liquidity in the pool.
|
||||
|
||||
* the main theme of sandwich attacks is slippage caused by available liquidity in the pool. As users, ensuring the slippage setting is within appropriate risk limit reduce the risk of large MEVs.
|
||||
|
||||
* to sandwich, a searcher will watch the mempool for large DEX trades.
|
||||
|
||||
* a searcher can calculate the approximate price effect of this large trade and execute an optimal buy order immediately before the large trade, then executing a sell order immediately after the large trade (selling it for the igher price caused by the large order).
|
||||
|
||||
* sandwiching is riskier as it isn't atomic an it's prone to [salmonella attack](https://github.co/Defi-Cartel/salmonella).
|
||||
|
||||
<br>
|
||||
|
||||
<img width="700" src="https://user-images.githubusercontent.com/1130416/196341536-47b22f79-404f-4c55-8091-30a7251adcb1.png">
|
||||
|
||||
|
||||
|
||||
<br>
|
||||
|
||||
---
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue