-
- Attacker: [0xe5eeae3973163863cd8bce9b70b5db2ef223af4a](https://etherscan.io/address/0xe5eeae3973163863cd8bce9b70b5db2ef223af4a)
- AD Alert: https://app.forta.network/alerts/0xe8c986607e5f9a47dded89…
-
- Attacker: [0xb5df6C45c854F263CbED6F5Fa91281714A1A62D6](https://polygonscan.com/address/0xb5df6c45c854f263cbed6f5fa91281714a1a62d6)
- AD Alert: https://app.forta.network/alerts/0x26e99d9469ac3b3a0e0…
-
- Attacker: [0xdf5fd23829151d64507ebac3a80562e9e5b9f497](https://etherscan.io/address/0xdf5fd23829151d64507ebac3a80562e9e5b9f497)
- AD Alert: https://app.forta.network/alerts/0x5efab6ed6df639fade9e42…
-
While #11 is helpful, its information is limited: as I realised, Flashbots misses quite a handful of easy-to-detect MEV. Another strategy might be first to identify a few active MEV bots, and then ana…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x61d1ed1693dbdb2fc92f36837d642575371cdab85d6831dbbf3cddb6f3b194a2
**Severity:** high
**Description:**
**Description*…
-
- Attacker: [0x5a0043909C2DB3DEf3369A8c2A8897020dCE705E](https://etherscan.io/address/0x5a0043909c2db3def3369a8c2a8897020dce705e)
- AD Alert: https://app.forta.network/alerts/0x90eda0ff723bc870ed4fad…
-
# Lines of code
https://github.com/code-423n4/2024-02-uniswap-foundation/blob/5a2761c8277541a24bc551fbd624413b384bea94/src/V3FactoryOwner.sol#L189-L195
# Vulnerability details
## Impact
Honest MEV…
-
The [GasStation](https://etherscan.io/address/0x04C0205b9D900a49597d9a0345aEAD6D73307C3B) was last topped up with 10 ETH at the beginning of March. It has been fully depleted since then due to the fol…
-
# Lines of code
https://github.com/code-423n4/2024-07-optimism/blob/70556044e5e080930f686c4e5acde420104bb2c4/packages/contracts-bedrock/src/cannon/PreimageOracle.sol#L568-L637
# Vulnerability detai…
-
# Lines of code
https://github.com/code-423n4/2023-06-stader/blob/main/contracts/Auction.sol#L62-L78
# Vulnerability details
## Impact
MEV bots may bid all the ongoing auctions before `Auction` is…