Papers
Topics
Authors
Recent
2000 character limit reached

Cross-Chain Sandwich Attack Analysis

Updated 4 December 2025
  • Cross-chain sandwich attacks are manipulative strategies targeting cross-chain bridge protocols by exploiting early swap parameter leakage to gain a temporal advantage.
  • They leverage liquidity pool events and automated market makers to front-run and back-run transactions across interconnected blockchain networks.
  • Mitigation strategies include using private relayers, event encryption, and calldata abstraction to obscure swap details, though each incurs trade-offs in decentralization and cost.

A cross-chain sandwich attack is a manipulative strategy targeting cross-chain bridge protocols—specifically those based on liquidity pools and automated market makers (AMMs)—which exploits the information leakage in cross-chain interoperability mechanisms. Unlike traditional single-chain sandwich attacks that rely on mempool transparency within a single blockchain, cross-chain sandwich attacks exploit the fact that detailed transaction information is broadcast via events on the source chain before the corresponding swap transaction even appears on the destination chain. This early leakage of swap parameters grants attackers a provable temporal and informational advantage, enabling them to place front-running and back-running transactions on the destination chain in a manner unachievable using classical memory pool (MEV) strategies. The effectiveness, distinctive workflow, and empirical scale of this attack vector have established it as a critical threat to cross-chain decentralized finance applications (Li et al., 19 Nov 2025).

1. Foundations of Cross-Chain Bridge Protocols and Attack Surface

Cross-chain interoperability enables trust-minimized asset and data transfers from a source chain (S\mathcal{S}), such as Ethereum, to a destination chain (D\mathcal{D}), such as BSC. In liquidity-pool-based cross-chain bridge protocols (e.g., Symbiosis), the workflow proceeds as follows:

  • On S\mathcal{S}, the user invokes a bridge contract CS\mathcal{C}_S with parameters (dstChain, Δx, s)({\text{dstChain}},\, \Delta x,\, s), locking or burning Δx\Delta x of token X, and emitting an event (OracleRequest) encapsulating all requisite calldata for execution on D\mathcal{D}.
  • Permissionless relayers observe this event and propagate it to D\mathcal{D}.
  • On D\mathcal{D}, the corresponding contract CD\mathcal{C}_D uses the event data to execute a DEX swap (Δx:X→Y\Delta x: X\to Y via a local AMM), releasing the output Y to the user.

Crucially, the OracleRequest event on S\mathcal{S} exposes the entire swap specification: liquidity pool address, input amount Δx\Delta x, minimum output (1−s)Δy(1-s)\Delta y, and DEX routing paths. These disclosures happen before any corresponding transaction enters the mempool of D\mathcal{D}, rendering swap execution entirely transparent to adversaries well in advance.

2. Comparison with Single-Chain Sandwich Attacks

A single-chain sandwich attack leverages the mempool’s openness to insert a pair of trades around a detected victim swap TvT_v (size Δxv\Delta x_v) with slippage tolerance ss:

  1. The attacker places a front-running swap TA1T_{A1} (ΔxA1:X→Y\Delta x_{A1}: X\to Y) at a premium gas price, inflating the X:YX:Y price.
  2. TvT_v executes at this adverse rate.
  3. The attacker back-runs with TA2T_{A2} (ΔyA1:Y→X\Delta y_{A1}: Y\to X), reversing the price distortion to extract profit.

The optimal front-run size ΔxA1\Delta x_{A1} equates the victim's post-sandwich price to their slippage limit using established AMM equations. Aggregate profit is P=ΔxA2−ΔxA1−GcP = \Delta x_{A2} - \Delta x_{A1} - G_c, with GcG_c denoting gas expenditure.

In contrast, cross-chain sandwich attacks enable the attacker to act on D\mathcal{D} prior to any observable activity in its mempool, entirely subverting defenses designed for single-chain MEV strategies (Li et al., 19 Nov 2025).

3. Mechanism and Formal Analysis of the Cross-Chain Attack

3.1 Information Flow and Adversarial Advantage

In AMM-based cross-chain messaging paradigms (CCMPs), source-chain events leak the deterministic calldata required for destination-chain execution. Adversaries monitoring S\mathcal{S} receive OracleRequest events exposing:

  • The target pool address
  • Input amount Δx\Delta x
  • Minimum return threshold (1−s)Δy(1-s)\Delta y
  • Routing details

This signal precedes and is independent of the subsequent destination-chain transaction’s mempool appearance, often by several seconds.

Formally, the attacker’s probability of sandwich success rises from a baseline PbaselineP_{\text{baseline}} (when only observing D\mathcal{D}’s mempool) to PfrontP_{\text{front}} with event leakage. Empirically, Pfront≈1P_{\text{front}} \approx 1, while PbaselineP_{\text{baseline}} may be $0.3$–$0.5$ under MEM-bot competition, yielding Advantage=Pfront−Pbaseline>0\mathrm{Advantage} = P_{\text{front}} - P_{\text{baseline}} > 0. This temporal dominance allows the attacker to submit a front-run in block Nv−1N_v-1 before the victim’s TvT_v, circumventing all mempool-based ordering controls (Li et al., 19 Nov 2025).

3.2 Workflow and Pseudocode Overview

The attack sequence is as follows:

  1. Monitor S\mathcal{S} for OracleRequest events revealing Δx\Delta x, ss, and pool.
  2. Compute optimal ΔxA1\Delta x_{A1} via AMM optimality equations.
  3. Immediately submit TA1T_{A1} to D\mathcal{D}, with a competitive gas price.
  4. Detect TvT_v’s execution on D\mathcal{D} at the manipulated price.
  5. Submit TA2T_{A2} (back-run) to recoup profit.
  6. Aggregate net profit: ΔxA2−ΔxA1−gas costs\Delta x_{A2} - \Delta x_{A1} - \text{gas costs}.

Sample (partial) pseudocode is:

1
2
3
4
5
6
7
8
def AttackerSandwich():
    subscribe to sourceChain.events(OracleRequest)
    onEvent(e):
        parse Δx, s, pool = e.calldata
        Δx_A1 = solve_AMM_optimality(Δx, s)
        sendTransaction(T_A1, pool, Δx_A1)
        await_confirmation(T_v, pool)
        sendTransaction(T_A2, pool, derive_Δy_A1(Δx_A1))

4. Empirical Quantification and Heuristic Detection

An empirical paper was conducted on the Symbiosis bridge protocol, covering transactions between August 10 and October 10, 2025. The dataset included 60,130 cross-chain transactions, filtered to 37,649 valid AMM-based swaps. A bespoke heuristic detector (Algorithm 1) was deployed, matching front-running and back-running transaction pairs on the destination chain by pool, direction, and token amounts—with surrounding timing windows and amplitude checks—while excluding classical single-chain (same-block) sandwiches.

Key findings:

  • 316,809 cross-chain sandwich pairs were identified, of which 269 occurred in the same block (representing classical single-chain MEV attacks).
  • The accrued profit (excluding gas) was $5.273 million USD on$412.6 million traded—1.28% of bridged volume.
  • Single-chain sandwiches found in the same dataset amounted to just $6.1K in profit, indicating the cross-chain variant’s dominance.
  • Top source/dest pairs: Ethereum→BSC ($2.096M), Base→BSC ($1.448M).
  • The BUSD↔WBNB pair on PancakeSwap V3 (BSC) was the principal attack target: 182,620 attacks, $3.17M profit.
  • Empirically, q=0.57q=0.57 (no noisy swap), p=0.68p=0.68 (profitable if noisy occurs), r+=4.5%r^+=4.5\%, r−=−4.7%r^-=-4.7\%; average expected per-trade return E[r]≈3.23%E[r]\approx 3.23\% (Li et al., 19 Nov 2025).

5. Profitability, Risks, and Defensive Limitations

Expected profit per attack is:

E[Π]=α×(ΔP)−CgasE[\Pi] = \alpha \times (\Delta P) - C_{\mathrm{gas}}

with:

  • α\alpha as the probability of no large interfering transactions,
  • ΔP\Delta P as price impact (approximately sΔxvs\Delta x_v),
  • CgasC_{\mathrm{gas}} as total gas cost.

A refined model incorporating noise parameters is:

E[P]=ΔxA1[(q+(1−q)p) r++(1−q)(1−p) r−]E[P] = \Delta x_{A1}\left[(q+(1-q)p)\,r^+ + (1-q)(1-p)\,r^-\right]

This captures the impact of stochastic, unrelated swaps ("noisy swaps") potentially affecting the realized profit. The profitability and success probability are markedly higher for cross-chain sandwich attacks than for single-chain attacks, due to the advance knowledge of victim intent not reliant on destination-chain mempool visibility.

Existing MEV defenses, including proposer-builder separation, fair ordering, and encrypted/private mempools, are circumvented because they assume the victim's transaction appears first in the target chain's mempool. In the cross-chain model, attackers act preemptively, before such visibility occurs (Li et al., 19 Nov 2025).

6. Mitigation Strategies and Open Challenges

Potential mitigations include:

  • Private relayers: Do not emit swap details on-chain; route calldata only to a trusted relay set, thereby trading off some degree of trust-minimization for privacy.
  • Event encryption: Source-chain events are encrypted, with plaintext revealed only via threshold decryption upon arrival on the destination chain. This adds considerable complexity and gas burden.
  • Calldata abstraction: On S\mathcal{S}, publish merely user intent (Δx,X,Y)(\Delta x,X,Y) rather than concrete pool or routing information, postponing swap path selection to execution time on D\mathcal{D}. This inhibits preemptive front-running by rendering prediction of the target pool infeasible.

Each mitigation involves practical trade-offs in decentralization, gas cost, and user experience. Current defensive techniques targeting single-chain MEV manipulation are ineffective against this cross-chain variant.

Open research questions include: extending analysis to other cross-chain MEV strategies (e.g., arbitrage, liquidation), modeling attacker adaptations to noisy transaction regimes, and designing formal protocols that cryptographically conceal swap parameters until execution, especially in heterogeneous (non-EVM, UTXO-based) ecosystems (Li et al., 19 Nov 2025).

Definition Search Book Streamline Icon: https://streamlinehq.com
References (1)

Whiteboard

Follow Topic

Get notified by email when new papers are published related to Cross-Chain Sandwich Attack.