Sub techniques (4)
| ID | Name |
|---|---|
| R02 | Dex vulnerability scan |
| RD06 | Bot development |
| R13 | Mem pool observation |
| E01 | Maximal extractable value mev attack |
| ID | Mitigation | Description |
|---|---|---|
| M21 | Buy/swap tokens/coins on decentralized exchanges, which implement solutions to protect users | To not become a victim of a sandwich attack users should use decentralized exchanges, which implement solutions to protect them. |
