Managing MEV Risk

EEA MEV Risk Mitigation Guidelines

Use Clear Transaction Ordering

Protocols SHOULD provide transaction ordering procedures that mitigate the Malicious Extraction of Value from other users' transactions.

Set Slippage Limits

Protocols SHOULD enable users to set slippage limits on transactions.

Use Realtime Monitoring

Protocols SHOULD use real-time monitoring to detect and where appropriate block MEV attacks.

Last updated