⚡️🤖 Introducing the inaugural Flashbots "MEV of the week" ⚡️🤖
This week, let's explore a novel use-case on Flashbots: rescuing a CryptoKitty (or other NFT) stuck in an Ethereum account with an accidentally disclosed private key!
When a private key or mnemonic seed is accidentally or maliciously disclosed, hacker(s) immediately transfer out all major ERC20 tokens and ETH to themselves. However, the hacker often leaves behind NFTs, lesser-known ERC20's, and complex positions (Maker Vaults, SNX, etc).
As a last ditch effort, the victim might try to transfer in some ETH for gas in order to quickly transfer out their litter of CryptoKitties. Unfortunately, after transferring in 0.01 ETH for gas, it is IMMEDIATELY withdrawn by the hacker's bot, which monitors all compromised keys
The victim has now INTENTIONALLY given the hacker even more ETH and their dear CryptoKitties are still in the pound. What we need is to execute a 0-gas-price transaction from the compromised account, but PAY the miner for the transaction from a different, safe account
What we need is a Flashbots bundle: a set of transactions that are included atomically in a block. The required bundle here is: [TX #1: 0-gas-price transfer of CryptoKitty from hacked account to safe account, TX #2: Unrelated account paying miner for TX #1]
You can follow @epheph.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled:

By continuing to use the site, you are consenting to the use of cookies as explained in our Cookie Policy to improve your experience.