Docs

MEV Protection on Movement

How Movement's shared sequencer and Move VM protect users from frontrunning, sandwich attacks, and other MEV extraction. Includes developer guidelines, application patterns, and integration best practices.

Overview

Maximal Extractable Value (MEV) refers to the profit that validators, sequencers, or third parties can extract by reordering, inserting, or censoring transactions. On many blockchains, MEV costs users billions of dollars annually through frontrunning, sandwich attacks, and other predatory practices. Movement addresses MEV at the protocol level through its shared sequencer (M1) and the inherent safety properties of the Move VM, providing protection by default rather than requiring users to opt in.

How It Works

Shared Sequencer (M1) Fair Ordering

Movement's M1 shared sequencer implements MEV-aware ordering policies that prioritize fairness. When transactions arrive at the sequencer, they are ordered according to transparent rules rather than by the highest bidder or the most profitable arrangement for the sequencer.

Key mechanisms include:

  • Time-weighted ordering -- Transactions are ordered primarily by arrival time, preventing validators from reordering them for profit.
  • Batch processing -- Certain transaction types are processed in batches where all participants receive the same execution price, eliminating the advantage of being first.
  • Private transaction submission -- Transactions can be submitted through private relays that shield them from public observation until inclusion in a block. This prevents the mempool observation that enables most MEV strategies.

Move VM Language-Level Protections

The Move language provides structural protections that make certain MEV attacks harder to execute:

  • Resource-oriented model -- Move's type system enforces that resources (tokens, assets) cannot be duplicated or implicitly destroyed. This eliminates certain classes of reentrancy-based MEV attacks.
  • Explicit capability system -- Access to resources requires explicit capabilities, reducing the surface area for unauthorized access patterns that MEV bots exploit.
  • No dynamic dispatch -- Move does not support arbitrary contract calls through dynamic dispatch, which limits the composability exploits that enable complex MEV strategies on EVM chains.

Protection Against Common Attack Vectors

Attack typeHow it worksMovement's protection
FrontrunningAttacker sees your pending transaction and submits the same trade firstPrivate relay hides transactions; time-weighted ordering prevents reordering
Sandwich attackAttacker places buy before and sell after your swap to extract valueBatch processing and private submission prevent observation and insertion
Just-in-time liquidityAttacker provides liquidity right before a large trade and removes it afterFair ordering limits the precision of JIT timing
Time-bandit attacksValidator reorganizes recent blocks to capture MEVBFT finality prevents block reorganization
CensorshipValidator excludes specific transactionsShared sequencer with inclusion guarantees

Why It Matters

For end users, MEV protection means:

  • Better execution prices on DEX swaps (no sandwich tax).
  • Fewer failed transactions (no frontrunners pushing gas prices up).
  • Fair access to NFT drops, token launches, and limited opportunities.

For developers, MEV protection means:

  • Simpler application design -- No need to build custom MEV defenses into every contract.
  • New application categories -- Sealed-bid auctions, fair token launches, and prediction markets become practical.
  • Better unit economics -- More value stays with users and protocols rather than being extracted.

Developer Use Cases

1. Decentralized Exchanges (DEXs)

Build DEX interfaces with natural slippage protection. Users receive execution prices closer to quoted prices without sandwich attacks inflating their costs. AMM pools can offer tighter spreads because less value leaks to MEV bots.

2. NFT Minting and Drops

Launch fair NFT drops where mint order is determined by MEV-resistant sequencing rather than gas wars. Dutch auctions and batch minting ensure collectors have equal access regardless of their technical sophistication.

3. Lending and Liquidation Systems

Design lending protocols where liquidations happen fairly. The predictable ordering ensures that liquidation incentives work as designed without excessive profits being extracted by MEV bots that frontrun legitimate liquidators.

4. Token Launch Platforms

Create token launch mechanisms with sealed-bid participation. Early buyers cannot be frontrun, and the opening price reflects genuine market demand rather than manipulation through strategic transaction ordering.

5. Prediction Markets

Build prediction markets where bet placement order does not leak information. Large bets cannot be frontrun, and market odds update fairly based on actual participation.

6. Cross-Chain Bridges

Develop bridge protocols that are not vulnerable to MEV attacks during cross-chain transfers. Protected ordering ensures fair exchange rates for users.

Code Examples

Submitting a Private Transaction

Simulating Before Submitting (Slippage Check)

Bash
# Simulate a swap to check expected output before committing
curl -X POST "https://api-movement-mainnet.n.dwellir.com/YOUR_API_KEY/v1/transactions/simulate" \
  -H "Content-Type: application/json" \
  -d '[{
    "sender": "0xYOUR_ADDRESS",
    "sequence_number": "42",
    "max_gas_amount": "10000",
    "gas_unit_price": "100",
    "expiration_timestamp_secs": "1700000000",
    "payload": {
      "type": "entry_function_payload",
      "function": "0xDEX::router::swap_exact_input",
      "type_arguments": [
        "0x1::aptos_coin::AptosCoin",
        "0xUSDC::coin::USDC"
      ],
      "arguments": ["1000000", "0"]
    },
    "signature": {
      "type": "ed25519_signature",
      "public_key": "0xYOUR_PUBLIC_KEY",
      "signature": "0x0000000000000000000000000000000000000000000000000000000000000000"
    }
  }]'

Best Practices

Set Appropriate Slippage Tolerances

Even with MEV protection, set reasonable slippage tolerances. The protection reduces but does not eliminate market impact from natural price movement. Use dynamic slippage calculation based on:

  • Pool liquidity depth
  • Recent price volatility
  • Trade size relative to pool reserves

Use Short Expiration Windows

Set transaction expiration timestamps close to the current time (30-60 seconds). This limits the window during which a transaction could be included under unfavorable conditions. Movement's fast finality means transactions that do not execute within a few seconds likely face issues that should be investigated rather than retried blindly.

When executing multiple related operations (approve + swap, or multi-hop routes), consider whether they should be batched into a single atomic transaction. Atomic batching prevents partial execution and reduces the surface area for inter-transaction manipulation.

Monitor Execution Quality

Track these metrics to verify MEV protection is working as expected:

  • Effective price vs. quoted price at the time of submission.
  • Transaction revert rates -- Unusual spikes may indicate manipulation attempts.
  • Execution delays -- Transactions taking longer than 3 seconds consistently may warrant investigation.

Performance Considerations

Private Relay Latency

Private transaction submission may add 100-500ms of latency compared to direct mempool submission. For most use cases, this is a worthwhile tradeoff. Latency-critical applications should measure and optimize their relay selection.

Gas Costs of Protection Patterns

Application-level protection mechanisms like commit-reveal schemes require multiple transactions. Calculate the break-even point where MEV protection value exceeds the additional gas costs -- typically around $100-500 in transaction value depending on network congestion.

Ordering Guarantees

Movement's MEV protection provides strong but not absolute guarantees. Design applications with defense in depth, combining protocol-level protection with application-level safeguards like slippage limits and deadline enforcement.

Advanced Techniques

Sealed-Bid Mechanisms

Implement cryptographic commitment schemes where participants submit hashed bids that can only be revealed after the bidding window closes. Movement's fair ordering ensures reveals happen in an un-frontrunnable sequence.

Time-Weighted Average Price (TWAP) Orders

Execute large trades across multiple blocks using TWAP algorithms. Movement's consistent ordering and MEV protection ensure each sub-transaction executes fairly without exploitation by MEV bots anticipating future parts of your order.

Programmable Privacy

Use Move's capability system to create assets and operations with limited visibility. While the sequencer must order transactions, careful use of Move's type system can hide transaction details until execution.

Comparison with Other Approaches

ApproachProtection levelUser action requiredScope
Movement (protocol-level)High -- sequencer + VM protectionsNone (default)All transactions
Flashbots Protect (Ethereum)Medium -- private relay onlyMust opt in per transactionSubmission phase only
Ethereum PBSLow -- democratizes MEV, does not eliminate itNoneBlock building only
Solana (no mempool)Low -- validators can still reorder within slotsNonePartial
Application-level (commit-reveal)High for specific actionsMust use supporting dAppsPer-application

Movement provides protocol-level MEV protection by default, meaning all users benefit without needing to understand MEV or take special precautions.