SlideShare a Scribd company logo
1 of 24
How dark is the forest?
Robert Miller
Encode x Wintermute
Flashbots
Treasure map
- How dark is the forest
- Evolution of arbitrage as a case study
- Anecdotes from whitehat rescues
- Clockwork Finance
- The unknown depths of the forest
Flashbots
How dark is the dark forest
That Ethereum is a “dark forest” is well
established now.
How dark is the forest really?
How close are we to the absolute limit of
maximally efficient MEV extraction?
Flashbots
How dark is the forest? MEV in 2021 estimates
Flashbots
Extracted MEV
Theoretical MEV
Note: Circles are not to scale.
MEV by the
numbers: ETH
L1
How dark is the forest? MEV in 2021 estimates
Flashbots
Extracted MEV
Theoretical MEV
How dark is the forest?
● How large is this gap?
● Where is extracted MEV reaching its
limits?
● Where is the circle of extracted MEV
expanding today?
● What frontiers should be explored?
Disclaimer: this presentation is my shower
thoughts!
MEV by the
numbers: ETH
L1
MEV by the
numbers: ETH
L1
Note: Circles are not to scale.
Flashbots
On arbitrage
Flashbots
On arbitrage: backrunning
Flashbots
On arbitrage: “generalized” backrunning
Swap on an
aggregator
(0x)
Subtrade to
Uniswap v2 gets
backrun
9
Flashbots
On arbitrage: pushing the limits
Flashbots
On arbitrage: non-ETH denominated
Flashbots
On arbitrage: summary
- If a transaction creates an arb then that arb will be captured in the next
transaction, not the next block
- Bots simulate all transactions in the mempool to look for arbs instead of only
looking for transactions which go directly to DEXes
- Over time searchers grew increasingly sophisticated in their extraction,
finding super long arbs
- Searchers are capturing non-ETH denominated arbs as well
It seems reasonable to assume that we’re approaching the limits of “theoretical”
arb extraction; the same applies for sandwiches and liquidations.
Flashbots
Pushing the limit of extracted: leveraged sandwiches
- Unique strategy lets a searcher lever
their $500k into ~$150m, which is
enough to sandwich Curve stablecoin
trades
- Complex strategy using 4 protocols
composed together
- Theoretically possible in a less
complicated way, but you’d need super
wealthy participants
- Novelty is the way that they access
capital, which makes converts some
MEV which is only “theoretical” to actual
extracted MEV.
Flashbots
Dark forest encounters from whitehat rescues
- I occasionally help with whitehat rescues of funds
- A friend tipped me off to an NFT that was mid-mint with a function like this
- I got in contact with the team, warned them their funds were at risk
- They ignored me ¯_(ツ)_/¯
- Funds got stolen after ~12 hours, which is surprising because a simple, single
transaction could have taken the funds
Flashbots
Dark forest encounters from whitehat rescues (2)
- A whitehat friend tipped me off to a
contract with a complex, multi-transaction
vulnerability
- The contract had ETH in it but only the
deployer had interacted with it
- I got in contact with the deployer and
disclosed the vulnerability. They
acknowledged and said they’d deal with it.
- They did not and later the funds were
stolen.
Flashbots
Dark forest encounters from whitehat rescues (3)
- You know the deal by now, tl;dr: vulnerable contract, but this time with USDC
at stake
- And … the funds were successfully recovered a few hours after they were at
risk!
- That seems to indicate that there are fewer or less sophisticated (or perhaps
no?) bots scanning for vulnerabilities that would get them ERC20 tokens
Flashbots
My takeaways from whitehat rescue encounters
- There are bots scanning for vulnerable contracts on Ethereum
- Some of these have an ability to reason about multi-transaction
vulnerabilities. It is likely that they use symbolic execution.
- Nonetheless, there is an odd gap between when money becomes at risk and
when it is taken. My guess is that exploits have to manually be actioned.
- There seems to be some limited scope. In particular, bots don’t seem to be
looking for ERC20 tokens or just aren’t good at that.
Flashbots
Exploits in practice
- A good amount of exploits on the left are bridge hacks, but
several are standard vulnerabilities or economic attacks
- Given the experience of the industry the gap between
theoretical and extracted MEV from these exploits seems
large? But it’s really quite hard to say.
- How can we better identify, quantify and prevent these
exploits?
Flashbots
Clockwork Finance
A general purpose, formal verification framework for reasoning
about the economic security of composed DeFi smart contracts
● Formal verification - study of computer programs through
mathematical models in well-defined logics. Can provably
reason mathematically about a program’s execution.
● Economic security - discover new economic attacks, rule out
classes of attack, or provide upper bounds on the exploitable
value of DeFi contracts
● Composed - can model how any smart contracts interact
together
Flashbots
CFF & MEV
- We can use CFF to formally reason about the maximum extractable value for
a given contract, set of contracts, as well as integrating txs in the mempool.
- “Without any explicitly programmed attack strategies CFF uncovers on
average an expected $56m of EV per month in the recent past”
- With limited coverage (Uniswap v2/MakerDAO) CFF uncovered ~$700m in annualized MEV
- Investigation needed: what is the delta between this number and my estimate before?
- CFF can also, theoretically, identify MEV from exploits like flashloan attacks!
- CFF lets us calculate the theoretical upperbound of MEV!
Flashbots
CFF & oracle manipulation
Flashbots
The unknown: cross-domain MEV
● There exists value that can be
extracted between two domains in
addition to value that only exists on
one domain
● How large is this? Hard to say.
● Counting CEX <> DEX arb then
probably larger than any MEV we
can quantify today.
Flashbots
The unknown: off-chain liquidity
- An increasing amount of liquidity or execution is off-chain (e.g. RFQs, 1inch
market making, just-in-time liquidity, Cowswap)
- When everything is on-chain it’s relatively straightforward to reason about
MEV but as things shift off-chain it becomes much more difficult to do so
- The same is true of cross-domain MEV as well
- As more activity shifts off-chain, even if settled on-chain, or multi-domain it is
becoming harder to reason about theoretical or extracted MEV
- In theory we could quantify the theoretical upper limit of MEV on Ethereum
using CFF given most activity is still on-chain and on 1 domain. But that might
be changing.
Flashbots
Summary
- Arbs, liquidations, and sandwiches likely are approaching theoretical limits
- Bots are scanning for vulnerable contracts, but are not sophisticated or
efficient (yet)
- Frameworks like Clockwork Finance are promising in that they can be used to
formally prove theoretical MEV upper bounds (inclusive of economic attacks)
but their application has been limited to date
- Cross-domain MEV & off-chain liquidity undermine Clockwork Finance
- How much cross-domain MEV there is in theory or practice is unknown
Thanks for listening :)
@bertcmiller on Twitter

More Related Content

What's hot

Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersKoen Vingerhoets
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basicsRomit Bose
 
Intro to smart contract on blockchain en
Intro to smart contract on blockchain enIntro to smart contract on blockchain en
Intro to smart contract on blockchain enNicholas Lin
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences101 Blockchains
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Jim Brysland
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionRoland Stadler
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus ProtocolsMelanie Swan
 
Présentation blockchain v2
Présentation blockchain v2Présentation blockchain v2
Présentation blockchain v2Amine HAMOUDA
 
Blockchain ecosystem and evolution
Blockchain ecosystem and evolutionBlockchain ecosystem and evolution
Blockchain ecosystem and evolutionChandra Sekhar AKNR
 
OpenZeppelin + Remix + BNB smart chain
OpenZeppelin + Remix + BNB smart chainOpenZeppelin + Remix + BNB smart chain
OpenZeppelin + Remix + BNB smart chainGene Leybzon
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMTal Be'ery
 
Ethereum in a nutshell
Ethereum in a nutshellEthereum in a nutshell
Ethereum in a nutshellDaniel Chan
 
Hyperledger Architecture Vol 2 > Smart Contracts
Hyperledger Architecture Vol 2 > Smart ContractsHyperledger Architecture Vol 2 > Smart Contracts
Hyperledger Architecture Vol 2 > Smart ContractsVIJAY MUTHU
 

What's hot (20)

Basic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgersBasic introduction in blockchain, smart contracts, permissioned ledgers
Basic introduction in blockchain, smart contracts, permissioned ledgers
 
Blockchain basics
Blockchain basicsBlockchain basics
Blockchain basics
 
Intro to smart contract on blockchain en
Intro to smart contract on blockchain enIntro to smart contract on blockchain en
Intro to smart contract on blockchain en
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
 
Blockchain concepts
Blockchain conceptsBlockchain concepts
Blockchain concepts
 
Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation Bitcoin Lightning Network - Presentation
Bitcoin Lightning Network - Presentation
 
The Lightning Network - A gentle introduction
The Lightning Network - A gentle introductionThe Lightning Network - A gentle introduction
The Lightning Network - A gentle introduction
 
Blockchain Consensus Protocols
Blockchain Consensus ProtocolsBlockchain Consensus Protocols
Blockchain Consensus Protocols
 
Lightning Network
Lightning  NetworkLightning  Network
Lightning Network
 
Ethereum
EthereumEthereum
Ethereum
 
Présentation blockchain v2
Présentation blockchain v2Présentation blockchain v2
Présentation blockchain v2
 
DeFi PPT.pptx
DeFi PPT.pptxDeFi PPT.pptx
DeFi PPT.pptx
 
Blockchain ecosystem and evolution
Blockchain ecosystem and evolutionBlockchain ecosystem and evolution
Blockchain ecosystem and evolution
 
Layer 2 Scaling Solutions
Layer 2 Scaling SolutionsLayer 2 Scaling Solutions
Layer 2 Scaling Solutions
 
Ethereum 2.0
Ethereum 2.0Ethereum 2.0
Ethereum 2.0
 
OpenZeppelin + Remix + BNB smart chain
OpenZeppelin + Remix + BNB smart chainOpenZeppelin + Remix + BNB smart chain
OpenZeppelin + Remix + BNB smart chain
 
Web3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEMWeb3 Security: The Blockchain is Your SIEM
Web3 Security: The Blockchain is Your SIEM
 
Crypto wallets
Crypto walletsCrypto wallets
Crypto wallets
 
Ethereum in a nutshell
Ethereum in a nutshellEthereum in a nutshell
Ethereum in a nutshell
 
Hyperledger Architecture Vol 2 > Smart Contracts
Hyperledger Architecture Vol 2 > Smart ContractsHyperledger Architecture Vol 2 > Smart Contracts
Hyperledger Architecture Vol 2 > Smart Contracts
 

Similar to How dark is the forest?

A Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdfA Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdfmadelyn nora
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Stephan Chenette
 
Uni v2 eth-dai analysis
Uni v2 eth-dai analysisUni v2 eth-dai analysis
Uni v2 eth-dai analysisJonnyHimalaya
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchainsRoderik van der Veer
 
BEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptxBEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptxcaniceconsulting
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®Nelson Brito
 
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola MarkovicDataScienceConferenc1
 
Eth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdfEth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdfAnthony De Monroy
 
The biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of MetaverseThe biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of MetaverseRafael Rodrigo Leitão
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainBernard Leong
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on HoneypotAmit Poonia
 
Flare Community Call - April 27.pdf
Flare Community Call - April 27.pdfFlare Community Call - April 27.pdf
Flare Community Call - April 27.pdfFlare Network
 
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...Daniel Fogg
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveZoltan Balazs
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Fivehacktivity
 
What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?InvestingTips
 
What is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptxWhat is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptxAlladin Nasir
 

Similar to How dark is the forest? (20)

A Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdfA Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdf
 
Light paper
Light paper Light paper
Light paper
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
Uni v2 eth-dai analysis
Uni v2 eth-dai analysisUni v2 eth-dai analysis
Uni v2 eth-dai analysis
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchains
 
BEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptxBEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptx
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®
 
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
 
White Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta ForceWhite Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta Force
 
Eth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdfEth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdf
 
The biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of MetaverseThe biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of Metaverse
 
Garbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management ServicesGarbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management Services
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Flare Community Call - April 27.pdf
Flare Community Call - April 27.pdfFlare Community Call - April 27.pdf
Flare Community Call - April 27.pdf
 
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
 
What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?
 
What is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptxWhat is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptx
 

More from TinaBregovi

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostTinaBregovi
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch EventTinaBregovi
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeTinaBregovi
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMTinaBregovi
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopTinaBregovi
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch EventTinaBregovi
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNetTinaBregovi
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with BriqTinaBregovi
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNetTinaBregovi
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNetTinaBregovi
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfTinaBregovi
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxTinaBregovi
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxTinaBregovi
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase NodeTinaBregovi
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionTinaBregovi
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP MeetingTinaBregovi
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0TinaBregovi
 
Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionTinaBregovi
 

More from TinaBregovi (20)

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on Bifrost
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch Event
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid Compute
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVM
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer Workshop
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch Event
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNet
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with Briq
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNet
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNet
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdf
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptx
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptx
 
Coinbase Node
Coinbase NodeCoinbase Node
Coinbase Node
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase Node
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty Competition
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP Meeting
 
Ecosystem WG
Ecosystem WGEcosystem WG
Ecosystem WG
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0
 
Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer version
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

How dark is the forest?

  • 1. How dark is the forest? Robert Miller Encode x Wintermute
  • 2. Flashbots Treasure map - How dark is the forest - Evolution of arbitrage as a case study - Anecdotes from whitehat rescues - Clockwork Finance - The unknown depths of the forest
  • 3. Flashbots How dark is the dark forest That Ethereum is a “dark forest” is well established now. How dark is the forest really? How close are we to the absolute limit of maximally efficient MEV extraction?
  • 4. Flashbots How dark is the forest? MEV in 2021 estimates
  • 5. Flashbots Extracted MEV Theoretical MEV Note: Circles are not to scale. MEV by the numbers: ETH L1 How dark is the forest? MEV in 2021 estimates
  • 6. Flashbots Extracted MEV Theoretical MEV How dark is the forest? ● How large is this gap? ● Where is extracted MEV reaching its limits? ● Where is the circle of extracted MEV expanding today? ● What frontiers should be explored? Disclaimer: this presentation is my shower thoughts! MEV by the numbers: ETH L1 MEV by the numbers: ETH L1 Note: Circles are not to scale.
  • 9. Flashbots On arbitrage: “generalized” backrunning Swap on an aggregator (0x) Subtrade to Uniswap v2 gets backrun 9
  • 12. Flashbots On arbitrage: summary - If a transaction creates an arb then that arb will be captured in the next transaction, not the next block - Bots simulate all transactions in the mempool to look for arbs instead of only looking for transactions which go directly to DEXes - Over time searchers grew increasingly sophisticated in their extraction, finding super long arbs - Searchers are capturing non-ETH denominated arbs as well It seems reasonable to assume that we’re approaching the limits of “theoretical” arb extraction; the same applies for sandwiches and liquidations.
  • 13. Flashbots Pushing the limit of extracted: leveraged sandwiches - Unique strategy lets a searcher lever their $500k into ~$150m, which is enough to sandwich Curve stablecoin trades - Complex strategy using 4 protocols composed together - Theoretically possible in a less complicated way, but you’d need super wealthy participants - Novelty is the way that they access capital, which makes converts some MEV which is only “theoretical” to actual extracted MEV.
  • 14. Flashbots Dark forest encounters from whitehat rescues - I occasionally help with whitehat rescues of funds - A friend tipped me off to an NFT that was mid-mint with a function like this - I got in contact with the team, warned them their funds were at risk - They ignored me ¯_(ツ)_/¯ - Funds got stolen after ~12 hours, which is surprising because a simple, single transaction could have taken the funds
  • 15. Flashbots Dark forest encounters from whitehat rescues (2) - A whitehat friend tipped me off to a contract with a complex, multi-transaction vulnerability - The contract had ETH in it but only the deployer had interacted with it - I got in contact with the deployer and disclosed the vulnerability. They acknowledged and said they’d deal with it. - They did not and later the funds were stolen.
  • 16. Flashbots Dark forest encounters from whitehat rescues (3) - You know the deal by now, tl;dr: vulnerable contract, but this time with USDC at stake - And … the funds were successfully recovered a few hours after they were at risk! - That seems to indicate that there are fewer or less sophisticated (or perhaps no?) bots scanning for vulnerabilities that would get them ERC20 tokens
  • 17. Flashbots My takeaways from whitehat rescue encounters - There are bots scanning for vulnerable contracts on Ethereum - Some of these have an ability to reason about multi-transaction vulnerabilities. It is likely that they use symbolic execution. - Nonetheless, there is an odd gap between when money becomes at risk and when it is taken. My guess is that exploits have to manually be actioned. - There seems to be some limited scope. In particular, bots don’t seem to be looking for ERC20 tokens or just aren’t good at that.
  • 18. Flashbots Exploits in practice - A good amount of exploits on the left are bridge hacks, but several are standard vulnerabilities or economic attacks - Given the experience of the industry the gap between theoretical and extracted MEV from these exploits seems large? But it’s really quite hard to say. - How can we better identify, quantify and prevent these exploits?
  • 19. Flashbots Clockwork Finance A general purpose, formal verification framework for reasoning about the economic security of composed DeFi smart contracts ● Formal verification - study of computer programs through mathematical models in well-defined logics. Can provably reason mathematically about a program’s execution. ● Economic security - discover new economic attacks, rule out classes of attack, or provide upper bounds on the exploitable value of DeFi contracts ● Composed - can model how any smart contracts interact together
  • 20. Flashbots CFF & MEV - We can use CFF to formally reason about the maximum extractable value for a given contract, set of contracts, as well as integrating txs in the mempool. - “Without any explicitly programmed attack strategies CFF uncovers on average an expected $56m of EV per month in the recent past” - With limited coverage (Uniswap v2/MakerDAO) CFF uncovered ~$700m in annualized MEV - Investigation needed: what is the delta between this number and my estimate before? - CFF can also, theoretically, identify MEV from exploits like flashloan attacks! - CFF lets us calculate the theoretical upperbound of MEV!
  • 21. Flashbots CFF & oracle manipulation
  • 22. Flashbots The unknown: cross-domain MEV ● There exists value that can be extracted between two domains in addition to value that only exists on one domain ● How large is this? Hard to say. ● Counting CEX <> DEX arb then probably larger than any MEV we can quantify today.
  • 23. Flashbots The unknown: off-chain liquidity - An increasing amount of liquidity or execution is off-chain (e.g. RFQs, 1inch market making, just-in-time liquidity, Cowswap) - When everything is on-chain it’s relatively straightforward to reason about MEV but as things shift off-chain it becomes much more difficult to do so - The same is true of cross-domain MEV as well - As more activity shifts off-chain, even if settled on-chain, or multi-domain it is becoming harder to reason about theoretical or extracted MEV - In theory we could quantify the theoretical upper limit of MEV on Ethereum using CFF given most activity is still on-chain and on 1 domain. But that might be changing.
  • 24. Flashbots Summary - Arbs, liquidations, and sandwiches likely are approaching theoretical limits - Bots are scanning for vulnerable contracts, but are not sophisticated or efficient (yet) - Frameworks like Clockwork Finance are promising in that they can be used to formally prove theoretical MEV upper bounds (inclusive of economic attacks) but their application has been limited to date - Cross-domain MEV & off-chain liquidity undermine Clockwork Finance - How much cross-domain MEV there is in theory or practice is unknown Thanks for listening :) @bertcmiller on Twitter