Managing MEV Risk

EEA MEV Risk Mitigation Guidelines

Use Clear Transaction Ordering

circle-info

Protocols SHOULD provide transaction ordering procedures that mitigate the Malicious Extraction of Value from other users' transactions.

Set Slippage Limits

circle-info

Protocols SHOULD enable users to set slippage limits on transactions.

Use Realtime Monitoring

circle-info

Protocols SHOULD use real-time monitoring to detect and where appropriate block MEV attacks.

Last updated