The Optimum Sandwich: How to Exploit Blockchain Enthusiasts

The Optimum Sandwich: How to Exploit Blockchain Enthusiasts

Mark Richardson

Mark Richardson

Aug 2, 2023

Aug 2, 2023

Introduction

I often have opportunity to discuss various aspects of our industry with a studious and enthusiastic audience. Anecdotally, sandwich attacks are among the more frequently requested discussion topics. I suspect the interest in this specific attack vector is owed to its ominous and threatening nature. Indeed, sandwich attacks are one of the more credible fears shared by the DeFi community; however, it is remarkable how few of its members can articulate exactly what a sandwich attack is, let alone derive the equations that describe how one is performed. I am forced to concede that I must shoulder at least part of the blame for the disappointing levels of erudition exhibited by the typical DeFi pedestrian. Experience demonstrates that I have failed to guide an otherwise capable and willing audience to the understanding they have politely asked for, and rightfully deserve. My resolve is to expose here the full itinerary for performing a sandwich attack, and the mathematical methods that allow for the industry’s top exploiters to wring dry every available wei of value (quite literally) from vulnerable trades. Under any other circumstance there may be a reasonable question of ethics with respect to publishing information that is so easily weaponizable. Unfortunately for us, those who would seek to weaponize it, have already, and so I see no adverse consequences to emptying the black boxes of our adversaries and exploring their contents together.


Expected Behavior

At the risk of sounding naïve, I want to begin by examining the prototypical case where a user trades against a generic constant product liquidity pool and expects to be delivered the tokens they surmised from the algorithms employed in the smart contracts with which they are interacting. That is, the result of the familiar swap function (eqn 1). To distinguish between inputs and outputs associated with the attacker and the user, I will use the subscripts a and u, respectively. Further, let x always denote the token that is being sent to the liquidity pool from either the attacker or the user, and let y always denote the token that is being sent from the liquidity pool to either the attacker or the user. I will also observe the old convention of denoting the liquidity pool swap fee with the lowercase Greek letter δ, and trade amounts with the uppercase form, Δ. Assume xyδ, Δx, Δy, are always positive real numbers, where Δx and Δy are quantities of tokens subtracted from- and added to the user or attacker wallets, respectively (and by inference, added to- and subtracted from the liquidity pool balances, respectively).



Assume a liquidity pool exists with 500 ETH and 1,000,000 USDC, representing a combined total value of approximately $2M USD, from which a market price of ETH near $2,000 can be inferred. For convenience, assume the pool fee level, δ, is fixed at 0.003 (i.e. 0.3%, or 30 basis points). Then, assume that a user is motivated to swap 20 ETH (i.e. ~$40K nominal value) with the pool. The expected result after the effect of price slippage and after accounting for the trading fee is summarized in figure 1.


Figure 1: The (naïve) expected result. 20 ETH is exchanged for 38,346.1538 USDC from a constant product liquidity pool comprising 500 ETH and 1,000,000 USDC, and near $2M USD total liquidity.


What is depicted above is the desired outcome, if we allow ourselves the dubious assumption that the user is familiar with the basics of constant-function market making (CFMM).


A Delicious Sandwich for One


Armed with only a modest working knowledge of the CFMM algorithm and the requisite skills for its algebraic manipulation, and perhaps a reckless disregard for the wellbeing of the user, it is possible to intervene in the expected process and siphon significant value away from the transaction and into your own wallet. Before I provide the instructions for performing such an attack under arbitrary conditions, I first want to demonstrate the attack using the expected behavior depicted in figure 1 as an example specimen.


Step 1: Front Run the Trade

After observing the user’s transaction in the mempool, the attacker can very quickly calculate a precise number of tokens to trade ahead of the user’s expected swap to maximize the effectiveness of the exploit. For now, take me at my word that the most efficient exploit is to front run the user’s 20 ETH trade with a swap in the same direction for 575,031.4616 USDC (figure 2). To the uninitiated, this may seem like a rather impulsive act. It has often been my experience that newcomers to DeFi, and especially those without prior knowledge in CeFi, are under the misapprehension that front running is akin to being beaten to an attractive price by another participant who is equally, if not more interested in the purchase of the same token as they are. Let me put that fantasy to rest. Save for a vanishing minority of cases, the person front running you has absolutely no interest in the token you are attempting to purchase.

Figure 2: Step 1 — Front run the trade. The attacker performs a large trade in the same direction as the user and makes certain that their swap is ahead of the user’s in the transaction sequence; 681.3677 ETH is swapped by the attacker for 575,031.4616 USDC.


Step 2: Allow the User’s Swap to Proceed on the Rigged Liquidity Pool

With the prices inside the liquidity pool now appropriately adjusted to set the stage for the exploit, it is now critical that the user’s swap transaction is executed immediately following the front run (figure 3). This would be a risky endeavor, were it not for the fact that these exploits are typically performed during block creation. That is, the person who is determining the order of transactions within the block is in a privileged position to decide the fate of the attempted exploit; if the exploit is their own, they can guarantee its success. If there is a margin for chance, it is sufficiently small as to be negligible.


Figure 3: Step 2 — Allow the user’s trade through. The attacker forces the user’s trade immediately after the front running transaction. 20 ETH is exchanged for 7,053.5213 USDC by the user; previously, in the unexploited example, the user received 38,346.1538 USDC for the same trade on the same liquidity pool (therefore suffering an 81.6% decrease).


Step 3: Back Run the Trade

In the third and final step, the attacker reverses their initial front run, by swapping all the USDC they had purchased only moments ago, back for ETH.


Figure 4: Step 3 — Back run the trade. The attacker forces their own back running transaction immediately after the user’s trade has been executed. The 575,031.4616 USDC acquired in the front running step is swapped back in its entirety for 693.6444 ETH, netting the attacker 12.2767 ETH in the round trip.


The important thing to note here is that the attacker has risked essentially nothing, and provided nothing of value to the system, save maybe for their involvement in “securing the blockchain” as part of the block building process. If this latter argument is to be entertained, I doubt many would hesitate to characterize the relationship between those participating in consensus and those inhabiting the chain for its own sake as abusive.


The Overall Result

The steps described above detail the mechanism of the attack (figures 2–4), and for many of you there will be very little offered in the way of new information thus far. However, I am hopeful that the following perspective regarding the overall process is sufficiently novel to earn your consideration, regardless of your prior familiarity with the subject.


Imagine for a moment that we become so exhausted and complacent as a community that we simply accept that these kinds of attack vectors are insurmountable — or worse, serve the purpose of a built-in tax vehicle in addition to gas costs demanded by those governing the infrastructure. Further, imagine that it is realized that there are a lot of unnecessary steps involved in these sandwich attacks, and that it would be preferable to arrive at the same result without the superfluous ritual of performing it. I am being deliberately hyperbolic, but I promise it doesn’t matter. The point is to consider the reductionist perspective.

  1. A user decides to trade ETH for USDC on a liquidity pool with a fee rate of 0.3% and nearly $2M in liquidity.


  2. They are expecting to send 20 ETH to the liquidity pool and receive 38,346.1538 USDC, and then commit to the transaction.


  3. A stranger arrives and takes 12.2767 ETH without warning and for no reason.


  4. The remaining 7.7233 ETH are sent to the liquidity pool to perform the swap.


  5. The liquidity pool then immediately changes its fee rate to 53.63% (i.e. a 17,776.9349% increase).


  6. The swap is performed, and the user receives 7,053.5213 USDC (in contrast to the 38,346.1538 USDC they were expecting).


  7. Finally, the liquidity pool then immediately reverts its fee level to that prior to the user’s exchange (i.e. back to 0.3%).


The steps above are completely redundant with the steps of performing a sandwich attack. The two have different mechanisms but arrive at precisely the same result; they are financially and, to some extent, computationally identical. While I would prefer everyone with an interest in the topic have a firm basis of understanding in the true mechanism, I’ll settle for a heuristic one so long as the facts regarding the precise transfer of value, and to whom, are consistent.


Figure 5: The overall result. The user sends 20 ETH, which is intercepted by the attacker, who removes 12.2767 ETH from the transaction, leaving only 7.7233 ETH for the trade. Then, the liquidity pool changes its fee level from 0.3% to 53.63%, before processing the exchange. The user then receives 7,053.5213 USDC according to the familiar swap algorithm (eqn 1) at the new fee level.


Precise Sandwich Elucidation


The sandwich attack detailed above is optimal for the state as it is presented, save for the lack of decimal places. That is, the 681.3677 ETH (in fact, 681.367696126344533020 ETH) used in the front running transaction is not an approximation, and the 12.2767 ETH (in fact, 12.276688934466993032 ETH) extracted by the attacker is the absolute maximum achievable.


Let Q be the total amount of ETH extracted by the attacker before gas is considered. It is a relatively easy task to nest the three swap equations together to calculate Q in terms of the swap fee, δ, the two token reserves of the liquidity pool, x and y, the number of ETH tokens sent to the liquidity pool by the user, Δxᵤ, and the amount of ETH tokens sent to the liquidity pool by the attacker during the front run, Δxₐ (eqn 2). However, the result is a little ugly.



Reducing eqn 2 and cancelling the y terms yields eqn 3.



The plot of Q versus Δxₐ reveals the attack profits profile with respect to the number of tokens committed during the front running step. At first, visual inspection of the graph is seemingly unrevealing; however, depicting the Δxₐ dimension on a logarithmic scale helps to exaggerate the feature of interest (figure 6). An interactive plot is provided for the reader’s convenience via desmos.


Figure 6: Q versus Δxₐ. Both plots are obtained from eqn 3; a) depicted on linear scales and b) the Δxₐ dimension on a logarithmic scale. The peak depicted in b) denotes the optimal Δxₐ token quantity to trade during the front running component of the attack.


The local maxima around the peak featured in figure 5 b) can be calculated from the partial derivative of eqn 3 with respect to Δxₐ, evaluated at 0 (eqn 4). The coefficients ABCD, are substituting for the other terms (xδ, and Δxᵤ), which are treated as constant for the purpose of computing the front running transaction (eqns 5–8).



Note that each of the coefficients A-D have the same denominator, 1-(1-δ)², which is an artefact of dividing through by the leading coefficient to force reduction to the monic equation type (i.e. leading coefficient = 1). Fortunately, eqn 4 is quartic, so solving for Δxₐ is not impossible, albeit inconvenient. For all realistic values (e.g. swap fee, token balances, swap amounts are greater than zero) eqn 4 has two real, and two complex roots. Only the root at Δxₐ > 0 (i.e. the part needed to perform the exploit), if one exists, is presented here. Note that depending on the fee level, δ, liquidity depth, x, and the user’s trade amount, Δxᵤ, some sandwich attacks are simply not profitable for any front running trade quantity, Δxₐ.


As is characteristic of quartics, the solution is best broken into smaller pieces for readability and clarity of presentation. The solution is thus broken up into ten constituent parts, represented by the Greek letters gamma (γ), nu (ν), omega (ω), phi (φ), tau (τ), mu (µ), eta (η), rho (ρ), beta (β) and alpha (α) (eqns 9–18). These labels have no standard meaning — they are a vestige of the method I used to solve and simplify the quartic.



The optimum front running transaction, which determines the total returns of the sandwich attack, Q, can be calculated by composing eqn 19 with the quartic intermediates γνωφτµηρβ and α (eqns 9–18), and the coefficients ABC, and D (eqns 5–8):



The method described here is generic. For example, implementing the formulae above for Δxᵤ = 12.345678910, x = 123.45678910, and δ = 0.012345678910 yields an optimal front running trade of Δxₐ = 121.983219009865770262 and net profits of Q= 6.075819297992183389 tokens. In general, the larger the user’s intended trade compared to the depth of the liquidity pool, and the lower the swap fee, the more profitable the exploit. At δ = 0 the exploit becomes asymptotic at Q = Δxᵤ as Δxₐ → ∞, as expected. Correcting for gas consumption is trivial, as the modelled gas cost can simply be subtracted from Q to complete the analysis from the attacker’s perspective.

Calculating the user’s tokens obtained from the pool following the attack, Δyᵤ, is relatively straight forward (eqn 20).



The “effective” fee level, δ*, which is the apparent fee charged on the swap amount after accounting for the attacker’s rake, Δxᵤ-Q, is similarly trivial to calculate (eqn 21).



I’ll save you the hassle of transcribing these equations if you promise not to use them for evil. The OptimumSandwich class (below) computes the optimum front running trade, Δxₐ, and prints an analysis sufficient to recreate figures 1–5. I consider the lack of documentation, tests, and error handling in the code block below to be appropriately compensated by the context and commentary provided by this article. Come at me (jk).


Conclusion


The purpose of this article is to provide an authoritative overview of sandwich attacks, and to service a somewhat selfish need to have a convenient flag in the literature to which I can refer in future discussions. However, this is only the most fundamental case; there are more complex methods that are outside of the scope of this article. For example, sophisticated exploits where the attacker controls the majority of the lp token supply belonging to the liquidity pool wherein the attack is performed, deliberate “baiting” by creating an attractive price compared to competing liquidity pools, and simultaneous sandwich & market arbitrage tactics are commonplace, but not explicitly discussed here. Regardless, the material provided is complete with respect to the scope of the discussion, and ought to satisfy the needs of almost any informed conversation on the topic.


I want to end this article with a challenge to the reader — both in the spirit of finding a silver lining, while also appealing to my own pedagogical ambitions. Given the mathematical descriptions presented here, it is possible to derive an expression for an “un-sandwichable” trade. That is, given the state of the pool (xδ), there is a maximum quantity of tokens being swapped by the user, Δxᵤ, for which any attempted sandwich attack will net zero in profit for the exploiter (i.e. Q = 0 and by inference, Δxₐ = 0). It stands to reason that such a trade amount can and should be exposed to users via the front-end for DeFi applications running a typical constant product CFMM at the smart contract level. If you have made it this far — the challenge I issue to you is this:

  1. For a generic liquidity pool with a reserve balance of x ETH and a swap fee of δ, what quantity of ETH, Δxᵤ, can the user swap without exposing a sandwich attack opportunity?


  2. For a generic liquidity pool with a reserve balance of x ETH, where the user is determined to trade a certain quantity of ETH, Δxᵤ, what swap fee setting, δ, would nullify the sandwich attack opportunity?


Postscript

This article is adjacent a recent contribution from Stefan Loesch regarding the resistance of Carbon, a trading protocol from Bancor, to sandwich attacks. Loesch’s article discusses the viability of sandwich attacks in the context of implied fee levels in the concentrated liquidity paradigm and speaks directly to the concepts embedded in the challenge questions above.


Code Block: Optimum Sandwich Class (python)


from decimal import Decimal, getcontext
getcontext().prec = 100

class OptimumSandwich:
    """
    Examples: 
    >>> OptimumSandwich()
    1. The user observes a pool with 500.000000 'x' tokens and 1000000.000000 'y' tokens, and a swap fee of 0.003000.
    2. The user elects to swap 20.000000 'x' tokens and expects to receive 38346.153846 'y' tokens.
    3. First, the attacker front runs the user's trade by swapping 681.367696 'x' tokens for 575031.461640 'y' tokens.
    4. Then, the user's trade is allowed through; the user swaps 20.000000 'x' tokens for 7053.521318 'y' tokens.
    5. Finally, the attacker back runs both of the previous trades by swapping 575031.461640 'y' tokens for 693.644385 'x' tokens.
    6. Therefore, the attacker has extracted a total of 12.276689 'x' tokens from the user's transaction.
    7. The overall process is equivalent to the user giving away 12.276689 'x' tokens to the attacker, then swapping the remaining 7.723311 'x' tokens with the pool.
    8. In addition to the sacrificed 'x' token quantity, the pool fee also appears to be increased from 0.003000 to 0.536308 (i.e. 17876.934872% increase).
    9. At the end of the process, the liquidity pool contains 507.723311 'x' tokens, and 992946.478682 'y' tokens.
    10. The user's losses are -81.605662% with respect to the expected outcome.
    
    >>> OptimumSandwich(
        x = Decimal('123.45678910'),
        y = Decimal('123456.78910'),
        d = Decimal('0.012345678910'),
        Dx_u = Decimal('12.345678910')
        )
    1. The user observes a pool with 123.456789 'x' tokens and 123456.789100 'y' tokens, and a swap fee of 0.012346.
    2. The user elects to swap 12.345679 'x' tokens and expects to receive 11084.784657 'y' tokens.
    3. First, the attacker front runs the user's trade by swapping 121.983219 'x' tokens for 60600.286699 'y' tokens.
    4. Then, the user's trade is allowed through; the user swaps 12.345679 'x' tokens for 2973.112594 'y' tokens.
    5. Finally, the attacker back runs both of the previous trades by swapping 60600.286699 'y' tokens for 128.059038 'x' tokens.
    6. Therefore, the attacker has extracted a total of 6.075819 'x' tokens from the user's transaction.
    7. The overall process is equivalent to the user giving away 6.075819 'x' tokens to the attacker, then swapping the remaining 6.269860 'x' tokens with the pool.
    8. In addition to the sacrificed 'x' token quantity, the pool fee also appears to be increased from 0.012346 to 0.501727 (i.e. 4063.984954% increase).
    9. At the end of the process, the liquidity pool contains 129.726649 'x' tokens, and 120483.676506 'y' tokens.
    10. The user's losses are -73.178436% with respect to the expected outcome.
    """
    def __init__(
        self,
        x: Decimal = Decimal('500'), # the 'x' token balance of the constant product liquidity pool.
        y: Decimal = Decimal('1_000_000'), # the 'y' token balance of the constant product liquidity pool.
        d: Decimal = Decimal('0.003'), # the fee level (decimal, 0.003 = 0.3% = 30 bps) of the constant product liquidity pool.
        Dx_u: Decimal = Decimal('20') # the number of 'x' tokens elected by the user to swap with the pool for 'y' tokens.
        ):
        self.x = x
        self.y = y
        self.d = d
        self.Dx_u = Dx_u
        self.A = self.calculate_coefficient_A()
        self.B = self.calculate_coefficient_B()
        self.C = self.calculate_coefficient_C()
        self.D = self.calculate_coefficient_D()
        self.gamma = self.calculate_gamma()
        self.nu = self.calculate_nu()
        self.omega = self.calculate_omega()
        self.phi = self.calculate_phi()
        self.tau = self.calculate_tau()
        self.mu = self.calculate_mu()
        self.eta = self.calculate_eta()
        self.rho = self.calculate_rho()
        self.beta = self.calculate_beta()
        self.alpha = self.calculate_alpha()
        self.Dx_a = self.calculate_Dx_a()
        self.Dy_a = self.calculate_Dy_expected(self.Dx_a)
        self.Q = self.calculate_Q()
        self.Dy_u_expected = self.calculate_Dy_expected(self.Dx_u)
        self.Dy_u_obtained = self.calculate_Dy_u_obtained()
        self.d_u = self.calculate_d_u()
        self.print_analysis()
        
    def calculate_coefficient_A(self):
        return(
            + Decimal('2')*self.d*(
                + Decimal('2') 
                - self.d
            )*(
                + self.Dx_u*(
                    + self.d 
                    + (
                        + Decimal('1') 
                        - self.d
                    )**Decimal('2')
                ) 
                + Decimal('2')*self.x
            )/(
                + Decimal('1') 
                - (
                    + Decimal('1') 
                    - self.d
                )**Decimal('2')
            )
        )
        
    def calculate_coefficient_B(self):
        return(
            + (
                + self.d*(
                    + self.Dx_u*(
                        + self.Dx_u 
                        + Decimal('6')*self.x
                        - (
                            + Decimal('1') 
                            - self.d
                        )*(
                            + self.Dx_u 
                            - (
                                + Decimal('1') 
                                - self.d
                            )**Decimal('2')*(
                                + Decimal('2')*self.x
                                + self.Dx_u 
                            )
                            + (
                                + Decimal('1') 
                                - self.d
                            )*(
                                + Decimal('3')*self.x 
                                - self.Dx_u
                            ) 
                        )
                    ) 
                    + Decimal('6')*self.x**Decimal('2')*(
                        + Decimal('2') 
                        - self.d
                    )
                )
            )/(
                + Decimal('1') 
                - (
                    + Decimal('1') 
                    - self.d
                )**Decimal('2')
            )
        )
    
    def calculate_coefficient_C(self):
        return(
            + (
                + Decimal('2')*self.x*(
                    + self.x
                    + self.d*self.Dx_u 
                )*(
                    + self.Dx_u*(
                        + (
                            + Decimal('1') 
                            - self.d
                        )**Decimal('2') 
                        - self.d
                    ) 
                    - Decimal('2')*self.d*self.x*(
                        + Decimal('2') 
                        - self.d
                    )
                )
            )/(
                + Decimal('1') 
                - (
                    + Decimal('1') 
                    - self.d
                )**Decimal('2')
            )
        )

    def calculate_coefficient_D(self):
        return(
            + self.x*(
                + self.x 
                + self.d*self.Dx_u
            )*(
                + (
                    + Decimal('1') 
                    - self.d
                )**Decimal('2')*(
                    + self.x 
                    + self.Dx_u
                )**Decimal('2') 
                - self.x*(
                    + self.x 
                    + self.d*self.Dx_u
                )
            )/(
                + Decimal('1') 
                - (
                    + Decimal('1') 
                    - self.d
                )**Decimal('2')
            )
        )
        
    def calculate_gamma(self):
        return(
            + (
                + self.B
                - (
                    + (
                        + Decimal('3')*self.A**Decimal('2')/Decimal('8')
                    )
                )
            )/Decimal('6')
        )
        
    def calculate_nu(self):
        return(
            + (
                + self.A*self.C/Decimal('4')
            )
        )
        
    def calculate_omega(self):  
        return(
            + self.gamma*(
                + self.nu
                + self.B*(
                    self.A/Decimal('4')
                )**Decimal('2')
                - Decimal('3')*(
                    + self.A/Decimal('4')
                )**Decimal('4')
                - self.D
            )
        )
        
    def calculate_phi(self):
        return(
            + (
                + (
                    + (
                        + self.A/Decimal('2')
                    )**Decimal('3') 
                    - (
                        + self.A*self.B
                    )/Decimal('2') 
                    - self.C
                )/Decimal('4')
            )**Decimal('2')
        )
        
    def calculate_tau(self):
        return(
            + self.D 
            - self.A*self.C/Decimal('4') 
            - self.B**Decimal('2')/Decimal('12')
        )
    
    def calculate_mu(self):
        return(
            + (
                + (
                    + (
                        + self.tau
                    )/Decimal('3') 
                )**Decimal('3')
                + (
                    + (
                        + self.omega 
                        - self.phi
                        - self.gamma**Decimal('3')
                    )**Decimal('2')
                )
            )**(
            + Decimal('1')/Decimal('2')
            )
        )

    def calculate_eta(self):
        return(
            + (
                + self.mu 
                + self.gamma**Decimal('3')
                + self.phi
                - self.omega
            )**(
                + Decimal('1')/Decimal('3')
            )
        )
        
    def calculate_rho(self):
        return(
            + Decimal('2')*self.tau/(
                + Decimal('3')*self.eta
            )
        )
        
    def calculate_beta(self):
        return(
            + (
                + (
                    + self.A/Decimal('2')
                )**Decimal('2') 
                - (
                    + Decimal('2')*self.B
                )/Decimal('3') 
                - self.rho 
                + Decimal('2')*self.eta
            )**(
                + Decimal('1')/Decimal('2')
            )
        )
        
    def calculate_alpha(self):
        return(
            + (
                + self.A**Decimal('2')/Decimal('2') 
                - (
                    + Decimal('4')*self.B
                )/Decimal('3') 
                - (
                    + self.A**Decimal('3')/Decimal('4') 
                    - self.A*self.B 
                    - Decimal('2')*self.C
                )/self.beta 
                - Decimal('2')*self.eta 
                + self.rho
            )**(
                + Decimal('1')/Decimal('2')
            )
        )
        
    def calculate_Dx_a(self):
        return(
            + (
                + self.alpha 
                + self.beta
            )/Decimal('2') 
            - self.A/Decimal('4')
        )
        
    def calculate_Q(self):
        return(
            + (
                + self.Dx_a*(
                    + self.Dx_u*(
                        + Decimal('1') 
                        - self.d
                    )*(
                        + self.Dx_a 
                        + self.x 
                        - self.Dx_a*(
                            + Decimal('1') 
                            - self.d
                        )
                    ) 
                    - (
                        + self.Dx_a 
                        + self.x
                    )*(
                        + self.Dx_a 
                        + self.Dx_u 
                        + self.x
                    ) 
                    + (
                        + Decimal('1') 
                        - self.d
                    )**Decimal('2')*(
                        + self.Dx_a 
                        + self.Dx_u 
                        + self.x
                    )**Decimal('2')
                )
            )/(
                + self.Dx_u*(
                    + Decimal('1') 
                    - self.d
                )*(
                    + self.Dx_a*(
                        + Decimal('1') 
                        - self.d
                    ) 
                    - self.Dx_a 
                    - self.x
                ) 
                + (
                    + self.Dx_a 
                    + self.x
                )*(
                    + self.Dx_a 
                    + self.Dx_u 
                    + self.x
                )
            )
        )
        
    def calculate_Dy_expected(self, Dx):
        return(
            + Dx*self.y*(
                + Decimal('1')
                - self.d
                )/(
                + self.x
                + Dx
            )
        )
    
    def calculate_Dy_u_obtained(self):
        return(
            + self.Dx_u*self.y*(
                + Decimal('1') 
                - self.d
            )*(
                + self.Dx_a*self.d 
                + self.x
            )/(
                + (
                    + self.Dx_a 
                    + self.x
                )*(
                    + self.Dx_a 
                    + self.Dx_u 
                    + self.x
                )
            )
        )
        
    def calculate_d_u(self):
        return(
            + Decimal('1')
            - self.Dy_u_obtained/self.y 
            - self.Dy_u_obtained*self.x/(
                + (
                    + self.Dx_u
                    - self.Q
                )*self.y
            )
        )
        
    def print_analysis(self):
        print(f"1. The user observes a pool with {self.x:.6f} 'x' tokens and {self.y:.6f} 'y' tokens, and a swap fee of {self.d:.6f}.")
        print(f"2. The user elects to swap {self.Dx_u:.6f} 'x' tokens and expects to receive {self.Dy_u_expected:.6f} 'y' tokens.")
        if self.Dx_a > Decimal('0'):
            print(f"3. First, the attacker front runs the user's trade by swapping {self.Dx_a:.6f} 'x' tokens for {self.Dy_a:.6f} 'y' tokens.")
            print(f"4. Then, the user's trade is allowed through; the user swaps {self.Dx_u:.6f} 'x' tokens for {self.Dy_u_obtained:.6f} 'y' tokens.")
            print(f"5. Finally, the attacker back runs both of the previous trades by swapping {self.Dy_a:.6f} 'y' tokens for {(self.Dx_a + self.Q):.6f} 'x' tokens.")
            print(f"6. Therefore, the attacker has extracted a total of {self.Q:.6f} 'x' tokens from the user's transaction.")
            print(f"7. The overall process is equivalent to the user giving away {self.Q:.6f} 'x' tokens to the attacker, then swapping the remaining {(self.Dx_u - self.Q):.6f} 'x' tokens with the pool.")
            print(f"8. In addition to the sacrificed 'x' token quantity, the pool fee also appears to be increased from {self.d:.6f} to {self.d_u:.6f} (i.e. {100*(self.d_u/self.d - 1):.6f}% increase).")
            print(f"9. At the end of the process, the liquidity pool contains {(self.x + self.Dx_u - self.Q):.6f} 'x' tokens, and {(self.y - self.Dy_u_obtained):.6f} 'y' tokens.")
            print(f"10. The user's losses are -{(Decimal('1') - self.Dy_u_obtained/self.Dy_u_expected)*100:.6f}% with respect to the expected outcome.")
        else:
            print('3. Any attempted sandwich attack on this trade will not benefit the exploiter in any way.')
        return None

Share on social

Alpha! Alpha!
Read all about it!

Alpha! Alpha!
Read all about it!

Subscribe for the latest updates on Carbon DeFi

Subscribe for the latest updates on Carbon DeFi

Carbon DeFi Logo

Carbon DeFi is a product of Bancor and isn't affiliated with Carbon - the cross-chain protocol built by Switcheo Labs

Powered by

Carbon DeFi Logo

Carbon DeFi is a product of Bancor and isn't affiliated with Carbon - the cross-chain protocol built by Switcheo Labs

Powered by

Carbon DeFi Logo

Carbon DeFi is a product of Bancor and isn't affiliated with Carbon - the cross-chain protocol built by Switcheo Labs

Powered by