A practical example on how to perform V2/V3 and multi-meat sandwich attacks written using Rust and Huff.
The goal of this repo is to act as reference material for searchers looking to implement their strategies using Rust and Huff.
final_demo.mp4
Anytime that a transaction interacts with a Uniswap V2/V3 pool and their forks, there is some slippage introduced (router swaps, aggregator swaps, other mev bots). Sandwich bots are a toxic form of MEV as they profit off this slippage by frontrunning the transaction pushing the price of the asset up to the slippage limit and then immediately selling the asset through a backrun transaction.
- Fully Generalized: Sandwich any tx that introduces slippage (routers, aggregators, mev bots, ...).
- V2 and V3 Logic: Logic to handle Uniswap V2/V3 pools.
- Multi-Meat: Build and send multi-meat sandwiches.
- Gas Optimized: Contract written in Huff using unconventional gas optimizations.
- Local Simulations: Fast concurrent EVM simulations to find sandwich opportunities.
- Token Dust: Stores dust at the end of every bundle for lower gas usage next time token is traded.
- Salmonella Checks: Detect if tx uses unusual opcodes that may produce different mainnet results.
- Discord Logging: Send notifications via discord webhooks.
Bot Logic Breakdown can be found under bot/README.md
Contract Logic Breakdown can be found under contract/README.md
If any bugs or optimizations are found, feel free to create a pull request. All pull requests are welcome!
Warning
This software is highly experimental and should be used at your own risk. Although tested, this bot is experimental software and is provided on an "as is" and "as available" basis under the MIT license. We cannot guarantee the stability or reliability of this codebase and are not responsible for any damage or loss caused by its use. We do not give out warranties.