Managing MEV Risk
EEA MEV Risk Mitigation Guidelines
Use Clear Transaction Ordering
Protocols SHOULD provide transaction ordering procedures that mitigate the Malicious Extraction of Value from other users' transactions.
Set Slippage Limits
Protocols SHOULD enable users to set slippage limits on transactions.
Use Realtime Monitoring
Protocols SHOULD use real-time monitoring to detect and where appropriate block MEV attacks.
Last updated