Solana cracks down on validator sandwich attacks
Sandwiching occurs by placing one order before the transaction and another immediately after, which ensures that retail always gets the worst possible price.
The Solana Foundation has removed a group of validator operators from its delegation program due to their involvement in sandwich attacks on traders.
In a Sandwich attack, a malicious trader searches the network of their choice, such as Ethereum, for a pending transaction. Sandwiching occurs by placing one order before the transaction and another immediately after.
The attacker will position the first pending transaction between a front-run and a back-run, both occurring simultaneously, to manipulate the asset’s price and profit from the difference.
Sandwiching occurs by placing one order before the transaction and another immediately after, which ensures that retail always gets the worst possible price.
The Solana Foundation has removed a group of validator operators from its delegation program due to their involvement in sandwich attacks on traders. In a Sandwich attack, a malicious trader searches the network of their choice, such as Ethereum, for a pending transaction. Sandwiching occurs by placing one order before the transaction and another immediately after. The attacker will position the first pending transaction between a front-run and a back-run, both occurring simultaneously, to manipulate the asset’s price and profit from the difference. Read more