(Jaichai) "The Sandwich Attack"

_UAbYdhy9GmS0eQGgRXlmpbIPOxs5-hfB1UEiIbr_OM.gif

(image by Reddit)

Thanks to @cloud7's (torum.com)excellent post (https://www.torum.com/post/616e5bb7b9e9c3130e592b93), awareness about the Sandwich Attack is now on Torum.

Unfortunately, a Sandwich Attack is pretty easy to pull off.

It's basically a front-running scheme that repeatedly skims small, virtually unnoticeable amounts from a user or group of users that do functionally similar, multiple transactions.

Any Black Hat that does his homework on the ins and outs of DeFi, can prey on unsuspecting targets; usually AMMs.

Why?

Because AMM pricing algorithms guarantee a high demand side that fosters continuous trading activity.

(There's got to be an ironic joke here. I mean, the "Sandwich Attack" on "Swap" platforms that are mostly named after food, no?)

Slippage is another story.

This is how most Sandwich Attacks are discovered.

That's because when the volume and liquidity of an asset change drastically, even small discrepancies can be spotted more easily.

Which means: "Black Hat, you is busted!"

1_L9SVA4SrDygob5kJ2g6T4w.gif

(image by Louis Land)

IMHO, lazy, idiotic projects that cut and paste code from other so-called "successful" platforms without vetting it beforehand - and when necessary, incorporating sufficient asset monitoring subroutines - will always be vulnerable to sh*t like this.

ezgif.com-resize-11.gif

(image by The Gist)

Okay, "nuff nerdy stuff.

Hats off to @cloud7 for heightening the awareness of this vulnerability to Torum.

Submitted FYI.

In lak'ech, JaiChai


JC Dead Pool Tricycle.jpeg

(JaiChai 19 OCT 2021. Simultaneous multi-site submissions posted. All rights reserved.)

H2
H3
H4
3 columns
2 columns
1 column
2 Comments
Ecency