SlideShare a Scribd company logo
How dark is the forest?
Robert Miller
Encode x Wintermute
Flashbots
Treasure map
- How dark is the forest
- Evolution of arbitrage as a case study
- Anecdotes from whitehat rescues
- Clockwork Finance
- The unknown depths of the forest
Flashbots
How dark is the dark forest
That Ethereum is a “dark forest” is well
established now.
How dark is the forest really?
How close are we to the absolute limit of
maximally efficient MEV extraction?
Flashbots
How dark is the forest? MEV in 2021 estimates
Flashbots
Extracted MEV
Theoretical MEV
Note: Circles are not to scale.
MEV by the
numbers: ETH
L1
How dark is the forest? MEV in 2021 estimates
Flashbots
Extracted MEV
Theoretical MEV
How dark is the forest?
● How large is this gap?
● Where is extracted MEV reaching its
limits?
● Where is the circle of extracted MEV
expanding today?
● What frontiers should be explored?
Disclaimer: this presentation is my shower
thoughts!
MEV by the
numbers: ETH
L1
MEV by the
numbers: ETH
L1
Note: Circles are not to scale.
Flashbots
On arbitrage
Flashbots
On arbitrage: backrunning
Flashbots
On arbitrage: “generalized” backrunning
Swap on an
aggregator
(0x)
Subtrade to
Uniswap v2 gets
backrun
9
Flashbots
On arbitrage: pushing the limits
Flashbots
On arbitrage: non-ETH denominated
Flashbots
On arbitrage: summary
- If a transaction creates an arb then that arb will be captured in the next
transaction, not the next block
- Bots simulate all transactions in the mempool to look for arbs instead of only
looking for transactions which go directly to DEXes
- Over time searchers grew increasingly sophisticated in their extraction,
finding super long arbs
- Searchers are capturing non-ETH denominated arbs as well
It seems reasonable to assume that we’re approaching the limits of “theoretical”
arb extraction; the same applies for sandwiches and liquidations.
Flashbots
Pushing the limit of extracted: leveraged sandwiches
- Unique strategy lets a searcher lever
their $500k into ~$150m, which is
enough to sandwich Curve stablecoin
trades
- Complex strategy using 4 protocols
composed together
- Theoretically possible in a less
complicated way, but you’d need super
wealthy participants
- Novelty is the way that they access
capital, which makes converts some
MEV which is only “theoretical” to actual
extracted MEV.
Flashbots
Dark forest encounters from whitehat rescues
- I occasionally help with whitehat rescues of funds
- A friend tipped me off to an NFT that was mid-mint with a function like this
- I got in contact with the team, warned them their funds were at risk
- They ignored me ¯_(ツ)_/¯
- Funds got stolen after ~12 hours, which is surprising because a simple, single
transaction could have taken the funds
Flashbots
Dark forest encounters from whitehat rescues (2)
- A whitehat friend tipped me off to a
contract with a complex, multi-transaction
vulnerability
- The contract had ETH in it but only the
deployer had interacted with it
- I got in contact with the deployer and
disclosed the vulnerability. They
acknowledged and said they’d deal with it.
- They did not and later the funds were
stolen.
Flashbots
Dark forest encounters from whitehat rescues (3)
- You know the deal by now, tl;dr: vulnerable contract, but this time with USDC
at stake
- And … the funds were successfully recovered a few hours after they were at
risk!
- That seems to indicate that there are fewer or less sophisticated (or perhaps
no?) bots scanning for vulnerabilities that would get them ERC20 tokens
Flashbots
My takeaways from whitehat rescue encounters
- There are bots scanning for vulnerable contracts on Ethereum
- Some of these have an ability to reason about multi-transaction
vulnerabilities. It is likely that they use symbolic execution.
- Nonetheless, there is an odd gap between when money becomes at risk and
when it is taken. My guess is that exploits have to manually be actioned.
- There seems to be some limited scope. In particular, bots don’t seem to be
looking for ERC20 tokens or just aren’t good at that.
Flashbots
Exploits in practice
- A good amount of exploits on the left are bridge hacks, but
several are standard vulnerabilities or economic attacks
- Given the experience of the industry the gap between
theoretical and extracted MEV from these exploits seems
large? But it’s really quite hard to say.
- How can we better identify, quantify and prevent these
exploits?
Flashbots
Clockwork Finance
A general purpose, formal verification framework for reasoning
about the economic security of composed DeFi smart contracts
● Formal verification - study of computer programs through
mathematical models in well-defined logics. Can provably
reason mathematically about a program’s execution.
● Economic security - discover new economic attacks, rule out
classes of attack, or provide upper bounds on the exploitable
value of DeFi contracts
● Composed - can model how any smart contracts interact
together
Flashbots
CFF & MEV
- We can use CFF to formally reason about the maximum extractable value for
a given contract, set of contracts, as well as integrating txs in the mempool.
- “Without any explicitly programmed attack strategies CFF uncovers on
average an expected $56m of EV per month in the recent past”
- With limited coverage (Uniswap v2/MakerDAO) CFF uncovered ~$700m in annualized MEV
- Investigation needed: what is the delta between this number and my estimate before?
- CFF can also, theoretically, identify MEV from exploits like flashloan attacks!
- CFF lets us calculate the theoretical upperbound of MEV!
Flashbots
CFF & oracle manipulation
Flashbots
The unknown: cross-domain MEV
● There exists value that can be
extracted between two domains in
addition to value that only exists on
one domain
● How large is this? Hard to say.
● Counting CEX <> DEX arb then
probably larger than any MEV we
can quantify today.
Flashbots
The unknown: off-chain liquidity
- An increasing amount of liquidity or execution is off-chain (e.g. RFQs, 1inch
market making, just-in-time liquidity, Cowswap)
- When everything is on-chain it’s relatively straightforward to reason about
MEV but as things shift off-chain it becomes much more difficult to do so
- The same is true of cross-domain MEV as well
- As more activity shifts off-chain, even if settled on-chain, or multi-domain it is
becoming harder to reason about theoretical or extracted MEV
- In theory we could quantify the theoretical upper limit of MEV on Ethereum
using CFF given most activity is still on-chain and on 1 domain. But that might
be changing.
Flashbots
Summary
- Arbs, liquidations, and sandwiches likely are approaching theoretical limits
- Bots are scanning for vulnerable contracts, but are not sophisticated or
efficient (yet)
- Frameworks like Clockwork Finance are promising in that they can be used to
formally prove theoretical MEV upper bounds (inclusive of economic attacks)
but their application has been limited to date
- Cross-domain MEV & off-chain liquidity undermine Clockwork Finance
- How much cross-domain MEV there is in theory or practice is unknown
Thanks for listening :)
@bertcmiller on Twitter

More Related Content

What's hot

Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
dcarro11
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.
SanjeebSamanta1
 
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Svetlin Nakov
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
Anurag Dashputre
 
Bitcoin & Bitcoin Mining
Bitcoin & Bitcoin MiningBitcoin & Bitcoin Mining
Bitcoin & Bitcoin Mining
Abdullah Khan Zehady
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & Blockchain
Jitendra Chittoda
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne
 
What is merkle tree
What is merkle treeWhat is merkle tree
What is merkle tree
Celine George
 
BitCoin report
BitCoin reportBitCoin report
BitCoin report
Hitesh Kumar Singh
 
Blockchain Security
Blockchain SecurityBlockchain Security
Blockchain Security
Munawar Hussain
 
Smart contracts
Smart contractsSmart contracts
Smart contracts
Philippe Camacho, Ph.D.
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)
Qais Ammari
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
Experfy
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency control
Prakash Poudel
 
Blockchain 2.0
Blockchain 2.0Blockchain 2.0
Blockchain 2.0
Jérôme Kehrli
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
Terek Judi
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Pablo Junco
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
Md. Syful Azam
 
Blockchain
BlockchainBlockchain
Blockchain
Amit Kumar
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
Sam Bowne
 

What's hot (20)

Bitcoin powerpoint
Bitcoin powerpointBitcoin powerpoint
Bitcoin powerpoint
 
An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.An in depth presentation of Cryptocurrency.
An in depth presentation of Cryptocurrency.
 
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
Multi-Signature Crypto-Wallets: Nakov at Blockchain Berlin 2018
 
Blockchain consensus algorithms
Blockchain consensus algorithmsBlockchain consensus algorithms
Blockchain consensus algorithms
 
Bitcoin & Bitcoin Mining
Bitcoin & Bitcoin MiningBitcoin & Bitcoin Mining
Bitcoin & Bitcoin Mining
 
Bitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & BlockchainBitcoin, Ethereum, Smart Contract & Blockchain
Bitcoin, Ethereum, Smart Contract & Blockchain
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
What is merkle tree
What is merkle treeWhat is merkle tree
What is merkle tree
 
BitCoin report
BitCoin reportBitCoin report
BitCoin report
 
Blockchain Security
Blockchain SecurityBlockchain Security
Blockchain Security
 
Smart contracts
Smart contractsSmart contracts
Smart contracts
 
Ethereum (Blockchain Network)
Ethereum (Blockchain Network)Ethereum (Blockchain Network)
Ethereum (Blockchain Network)
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency control
 
Blockchain 2.0
Blockchain 2.0Blockchain 2.0
Blockchain 2.0
 
Introduction to Ethereum
Introduction to EthereumIntroduction to Ethereum
Introduction to Ethereum
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Blockchain
BlockchainBlockchain
Blockchain
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 

Similar to How dark is the forest?

A Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdfA Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdf
madelyn nora
 
Light paper
Light paper Light paper
Light paper
wijitha gayan
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Stephan Chenette
 
Uni v2 eth-dai analysis
Uni v2 eth-dai analysisUni v2 eth-dai analysis
Uni v2 eth-dai analysis
JonnyHimalaya
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchains
Roderik van der Veer
 
BEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptxBEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptx
caniceconsulting
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®
Nelson Brito
 
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
DataScienceConferenc1
 
White Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta ForceWhite Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta Force
Meta Force File Slide
 
Eth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdfEth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdf
Anthony De Monroy
 
The biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of MetaverseThe biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of Metaverse
Rafael Rodrigo Leitão
 
Garbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management ServicesGarbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management Services
OnBoard Security, Inc. - a Qualcomm Company
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
Bernard Leong
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
Amit Poonia
 
Flare Community Call - April 27.pdf
Flare Community Call - April 27.pdfFlare Community Call - April 27.pdf
Flare Community Call - April 27.pdf
Flare Network
 
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Daniel Fogg
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
Zoltan Balazs
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
hacktivity
 
What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?
InvestingTips
 
What is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptxWhat is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptx
Alladin Nasir
 

Similar to How dark is the forest? (20)

A Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdfA Deep Dive Into Maximal Extractable Value (MEV).pdf
A Deep Dive Into Maximal Extractable Value (MEV).pdf
 
Light paper
Light paper Light paper
Light paper
 
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
Detecting Web Browser Heap Corruption Attacks - Stephan Chenette, Moti Joseph...
 
Uni v2 eth-dai analysis
Uni v2 eth-dai analysisUni v2 eth-dai analysis
Uni v2 eth-dai analysis
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchains
 
BEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptxBEGIN BLOCKCHAIN - Module 5 v2.pptx
BEGIN BLOCKCHAIN - Module 5 v2.pptx
 
[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®[PH-Neutral 0x7db] Exploit Next Generation®
[PH-Neutral 0x7db] Exploit Next Generation®
 
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
[Cryptica 22] Introduction to Decentralized Finance - Nikola Markovic
 
White Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta ForceWhite Paper FORCECOIN of Meta Force
White Paper FORCECOIN of Meta Force
 
Eth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdfEth-Defi-Ecosystem-v2022.pdf
Eth-Defi-Ecosystem-v2022.pdf
 
The biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of MetaverseThe biggest challenge with the Cybersecurity in the era of Metaverse
The biggest challenge with the Cybersecurity in the era of Metaverse
 
Garbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management ServicesGarbled Circuits for Secure Credential Management Services
Garbled Circuits for Secure Credential Management Services
 
An Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / BlockchainAn Investor's Guide to Web3 / Crypto / Blockchain
An Investor's Guide to Web3 / Crypto / Blockchain
 
Seminar Report on Honeypot
Seminar Report on HoneypotSeminar Report on Honeypot
Seminar Report on Honeypot
 
Flare Community Call - April 27.pdf
Flare Community Call - April 27.pdfFlare Community Call - April 27.pdf
Flare Community Call - April 27.pdf
 
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
Everyday DeFi - Onboarding the First Billion Users into Crypto (RSK, RIF, IOV...
 
Explain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a fiveExplain Ethereum smart contract hacking like i am a five
Explain Ethereum smart contract hacking like i am a five
 
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m FiveZoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
Zoltán Balázs - Ethereum Smart Contract Hacking Explained like I’m Five
 
What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?What Is The Ethereum Upgrade?
What Is The Ethereum Upgrade?
 
What is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptxWhat is Uniswap and how does it work.pptx
What is Uniswap and how does it work.pptx
 

More from TinaBregovi

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on Bifrost
TinaBregovi
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch Event
TinaBregovi
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid Compute
TinaBregovi
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVM
TinaBregovi
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer Workshop
TinaBregovi
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch Event
TinaBregovi
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNet
TinaBregovi
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with Briq
TinaBregovi
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNet
TinaBregovi
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNet
TinaBregovi
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdf
TinaBregovi
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptx
TinaBregovi
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptx
TinaBregovi
 
Coinbase Node
Coinbase NodeCoinbase Node
Coinbase Node
TinaBregovi
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase Node
TinaBregovi
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty Competition
TinaBregovi
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP Meeting
TinaBregovi
 
Ecosystem WG
Ecosystem WGEcosystem WG
Ecosystem WG
TinaBregovi
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0
TinaBregovi
 
Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer version
TinaBregovi
 

More from TinaBregovi (20)

Building LSD Use Cases on Bifrost
Building LSD Use Cases on BifrostBuilding LSD Use Cases on Bifrost
Building LSD Use Cases on Bifrost
 
Urbit Launch Event
Urbit Launch EventUrbit Launch Event
Urbit Launch Event
 
Layer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid ComputeLayer Hack: Boba Network: Understanding Hybrid Compute
Layer Hack: Boba Network: Understanding Hybrid Compute
 
Layer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVMLayer Hack: zkSync - Intro to zkEVM
Layer Hack: zkSync - Intro to zkEVM
 
Layer Hack: AltLayer Workshop
Layer Hack: AltLayer WorkshopLayer Hack: AltLayer Workshop
Layer Hack: AltLayer Workshop
 
Layer Hack Launch Event
Layer Hack Launch EventLayer Hack Launch Event
Layer Hack Launch Event
 
Bridging with StarkNet
Bridging with StarkNetBridging with StarkNet
Bridging with StarkNet
 
How To Build Better NFTs with Briq
How To Build Better NFTs with BriqHow To Build Better NFTs with Briq
How To Build Better NFTs with Briq
 
NFTs on StarkNet
NFTs on StarkNetNFTs on StarkNet
NFTs on StarkNet
 
How to build a dApp in StarkNet
How to build a dApp in StarkNetHow to build a dApp in StarkNet
How to build a dApp in StarkNet
 
Braavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdfBraavos Wallet Workshop.pdf
Braavos Wallet Workshop.pdf
 
StarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptxStarkNet Autumn Hackathon Launch Event.pptx
StarkNet Autumn Hackathon Launch Event.pptx
 
Harmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptxHarmony Marketplace SDK.pptx
Harmony Marketplace SDK.pptx
 
Coinbase Node
Coinbase NodeCoinbase Node
Coinbase Node
 
Get Ready for Coinbase Node
Get Ready for Coinbase NodeGet Ready for Coinbase Node
Get Ready for Coinbase Node
 
MANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty CompetitionMANIFOLD MEV Bounty Competition
MANIFOLD MEV Bounty Competition
 
Public SP Meeting
Public SP MeetingPublic SP Meeting
Public SP Meeting
 
Ecosystem WG
Ecosystem WGEcosystem WG
Ecosystem WG
 
Welcome to the Web 3.0
Welcome to the Web 3.0Welcome to the Web 3.0
Welcome to the Web 3.0
 
Introduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer versionIntroduction to IPFS & Filecoin - longer version
Introduction to IPFS & Filecoin - longer version
 

Recently uploaded

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 

Recently uploaded (20)

Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 

How dark is the forest?

  • 1. How dark is the forest? Robert Miller Encode x Wintermute
  • 2. Flashbots Treasure map - How dark is the forest - Evolution of arbitrage as a case study - Anecdotes from whitehat rescues - Clockwork Finance - The unknown depths of the forest
  • 3. Flashbots How dark is the dark forest That Ethereum is a “dark forest” is well established now. How dark is the forest really? How close are we to the absolute limit of maximally efficient MEV extraction?
  • 4. Flashbots How dark is the forest? MEV in 2021 estimates
  • 5. Flashbots Extracted MEV Theoretical MEV Note: Circles are not to scale. MEV by the numbers: ETH L1 How dark is the forest? MEV in 2021 estimates
  • 6. Flashbots Extracted MEV Theoretical MEV How dark is the forest? ● How large is this gap? ● Where is extracted MEV reaching its limits? ● Where is the circle of extracted MEV expanding today? ● What frontiers should be explored? Disclaimer: this presentation is my shower thoughts! MEV by the numbers: ETH L1 MEV by the numbers: ETH L1 Note: Circles are not to scale.
  • 9. Flashbots On arbitrage: “generalized” backrunning Swap on an aggregator (0x) Subtrade to Uniswap v2 gets backrun 9
  • 12. Flashbots On arbitrage: summary - If a transaction creates an arb then that arb will be captured in the next transaction, not the next block - Bots simulate all transactions in the mempool to look for arbs instead of only looking for transactions which go directly to DEXes - Over time searchers grew increasingly sophisticated in their extraction, finding super long arbs - Searchers are capturing non-ETH denominated arbs as well It seems reasonable to assume that we’re approaching the limits of “theoretical” arb extraction; the same applies for sandwiches and liquidations.
  • 13. Flashbots Pushing the limit of extracted: leveraged sandwiches - Unique strategy lets a searcher lever their $500k into ~$150m, which is enough to sandwich Curve stablecoin trades - Complex strategy using 4 protocols composed together - Theoretically possible in a less complicated way, but you’d need super wealthy participants - Novelty is the way that they access capital, which makes converts some MEV which is only “theoretical” to actual extracted MEV.
  • 14. Flashbots Dark forest encounters from whitehat rescues - I occasionally help with whitehat rescues of funds - A friend tipped me off to an NFT that was mid-mint with a function like this - I got in contact with the team, warned them their funds were at risk - They ignored me ¯_(ツ)_/¯ - Funds got stolen after ~12 hours, which is surprising because a simple, single transaction could have taken the funds
  • 15. Flashbots Dark forest encounters from whitehat rescues (2) - A whitehat friend tipped me off to a contract with a complex, multi-transaction vulnerability - The contract had ETH in it but only the deployer had interacted with it - I got in contact with the deployer and disclosed the vulnerability. They acknowledged and said they’d deal with it. - They did not and later the funds were stolen.
  • 16. Flashbots Dark forest encounters from whitehat rescues (3) - You know the deal by now, tl;dr: vulnerable contract, but this time with USDC at stake - And … the funds were successfully recovered a few hours after they were at risk! - That seems to indicate that there are fewer or less sophisticated (or perhaps no?) bots scanning for vulnerabilities that would get them ERC20 tokens
  • 17. Flashbots My takeaways from whitehat rescue encounters - There are bots scanning for vulnerable contracts on Ethereum - Some of these have an ability to reason about multi-transaction vulnerabilities. It is likely that they use symbolic execution. - Nonetheless, there is an odd gap between when money becomes at risk and when it is taken. My guess is that exploits have to manually be actioned. - There seems to be some limited scope. In particular, bots don’t seem to be looking for ERC20 tokens or just aren’t good at that.
  • 18. Flashbots Exploits in practice - A good amount of exploits on the left are bridge hacks, but several are standard vulnerabilities or economic attacks - Given the experience of the industry the gap between theoretical and extracted MEV from these exploits seems large? But it’s really quite hard to say. - How can we better identify, quantify and prevent these exploits?
  • 19. Flashbots Clockwork Finance A general purpose, formal verification framework for reasoning about the economic security of composed DeFi smart contracts ● Formal verification - study of computer programs through mathematical models in well-defined logics. Can provably reason mathematically about a program’s execution. ● Economic security - discover new economic attacks, rule out classes of attack, or provide upper bounds on the exploitable value of DeFi contracts ● Composed - can model how any smart contracts interact together
  • 20. Flashbots CFF & MEV - We can use CFF to formally reason about the maximum extractable value for a given contract, set of contracts, as well as integrating txs in the mempool. - “Without any explicitly programmed attack strategies CFF uncovers on average an expected $56m of EV per month in the recent past” - With limited coverage (Uniswap v2/MakerDAO) CFF uncovered ~$700m in annualized MEV - Investigation needed: what is the delta between this number and my estimate before? - CFF can also, theoretically, identify MEV from exploits like flashloan attacks! - CFF lets us calculate the theoretical upperbound of MEV!
  • 21. Flashbots CFF & oracle manipulation
  • 22. Flashbots The unknown: cross-domain MEV ● There exists value that can be extracted between two domains in addition to value that only exists on one domain ● How large is this? Hard to say. ● Counting CEX <> DEX arb then probably larger than any MEV we can quantify today.
  • 23. Flashbots The unknown: off-chain liquidity - An increasing amount of liquidity or execution is off-chain (e.g. RFQs, 1inch market making, just-in-time liquidity, Cowswap) - When everything is on-chain it’s relatively straightforward to reason about MEV but as things shift off-chain it becomes much more difficult to do so - The same is true of cross-domain MEV as well - As more activity shifts off-chain, even if settled on-chain, or multi-domain it is becoming harder to reason about theoretical or extracted MEV - In theory we could quantify the theoretical upper limit of MEV on Ethereum using CFF given most activity is still on-chain and on 1 domain. But that might be changing.
  • 24. Flashbots Summary - Arbs, liquidations, and sandwiches likely are approaching theoretical limits - Bots are scanning for vulnerable contracts, but are not sophisticated or efficient (yet) - Frameworks like Clockwork Finance are promising in that they can be used to formally prove theoretical MEV upper bounds (inclusive of economic attacks) but their application has been limited to date - Cross-domain MEV & off-chain liquidity undermine Clockwork Finance - How much cross-domain MEV there is in theory or practice is unknown Thanks for listening :) @bertcmiller on Twitter