mirror of
https://github.com/autistic-symposium/mev-toolkit.git
synced 2025-05-07 17:24:57 -04:00
.. | ||
malicious_tokens.md | ||
README.md |
PvP bot battles
cool stories
salmonella
- exploited the generalised nature of front-running setups through an erc20 token that could detect when a non-owner is transacting it, returning just 10% of the amount.
- source code
kattana
- trap for front-running bots during token listing.
YOLOchain
- bert miller thread
- instead of users paying tx fees via gas prices, flashbots users pay fees via a smart contract call which transfers eth to miner.
- miners receive bundles of txs from users and include the bundle that pays the most
- sandwich bots watch the mempool for users buying on dexes and sandwich them
- bots will simulate their txs on local infrastrcuture
other stories of hacked MEV bot
- https://twitter.com/AnciliaInc/status/1580705036400611328
- https://twitter.com/BlockSecTeam/status/1580779311862190080
- https://twitter.com/MevRefund/status/1537421091697836032
- https://twitter.com/MevRefund/status/1580652170592280576
- a list of malicious tokens[https://github.com/kailinr/cyanide]
resources
- disassembling mev bots, by noxx
- [toxic tokens contracts (salmonella derivatives)