Cross-Chain Sandwich Attacks
- Cross-Chain Sandwich Attacks are multi-chain exploits that leverage public cross-chain messages to front-run and back-run swap transactions.
- The attack synchronizes front-run and back-run transactions across chains, enabling attackers to extract significant profits by exploiting timing advantages.
- Mitigation strategies such as encrypted events, private relayers, and time-lock commitments are proposed to curb information leakage and secure cross-chain communications.
A cross-chain sandwich attack is a multi-chain extension of the classic single-chain maximum extractable value (MEV) sandwich, exploiting cross-chain message leaks in decentralized finance (DeFi) protocols built around liquidity-pool-based cross-chain bridges. By eavesdropping on public on-chain events from a source blockchain, the attacker gains an information advantage, enabling the strategic placement of front-running and back-running transactions on a destination chain. This attack undermines current MEV defenses, leading to significant extractable value and threatening the security guarantees of cross-chain infrastructure (Li et al., 19 Nov 2025).
1. Formal Definition and Attacker Model
A cross-chain sandwich attack occurs between two blockchains, denoted S (source) and D (destination), connected by a cross-chain messaging protocol (CCMP), which includes Commit, Verify, Consensus, and Execute steps. The victim user submits a cross-chain swap intent via Commit on S, emitting a public on-chain event that reveals the swap parameters—token pair , input amount , slippage , destination liquidity pool , and minimum return.
An adversary observes this event at block before the intended swap transaction appears in D's mempool, introducing a time advantage . The adversary computes the optimal front-running input using the slippage-equality condition: where are pre-attack reserves, and is the swap fee. The attacker times their front-run transaction prior to , and then back-runs with immediately after on D.
The expected profit, accounting for noisy swaps and stochasticity, is
where is the probability of no intervening swaps, the probability of remaining profitable despite noise, and the mean positive/negative rates, respectively [(Li et al., 19 Nov 2025), Eq. 2]. In scenarios without single-chain competition, the theoretical maximum profit is .
2. Vulnerability in Liquidity-Pool-Based Cross-Chain Bridges
Protocols such as Symbiosis, ThorSwap, and deBridge parallel single-chain AMM semantics on the destination chain but require relayers to transmit all swap parameters through on-chain events on the source chain. In standard operation:
- Users initiate swaps via BridgeContract on S, emitting an OracleRequest event with full calldata for execution on D.
- Relayers access and forward this public event.
- Only during the Execute phase on D does the actual victim swap become pending in D's mempool.
The public emission of calldata—including assets, amounts, target pools, and slippage—provides adversaries a guaranteed information lead, unmitigated by destination-chain mempool privacy or ordering defenses. This underlying protocol design is the core enabler of cross-chain sandwich attacks (Li et al., 19 Nov 2025).
3. Execution Sequence and Attack Workflow
The attack proceeds as follows:
- The user submits a swap on S, triggering the emission of an OracleRequest event at .
- monitors S, retrieves , and locally simulates it to extract pool , amount , and slippage .
- computes and submits the optimal front-run transaction on D, timed immediately after .
- Relayers conduct consensus and submit the victim's transaction for execution on D.
- posts the back-run transaction immediately after , typically leveraging higher gas price or private relays to win block inclusion.
- Profits accrue as , where is cumulative gas cost.
This approach yields a systematic information advantage: the attacker's always arrives on D before any mempool-based MEV bot can react, and in back-running, empirical analysis shows attackers win the race for 55% of instances [(Li et al., 19 Nov 2025), Table VI]. The workflow by design subverts mempool-based ordering fairness by acting before is even visible in the destination infrastructure.
4. Heuristic Detection and Empirical Characterization
Detection of real-world cross-chain sandwich attacks is accomplished via a heuristic model tailored to historical Symbiosis bridge data. Key detection rules include:
- Directionality: Both and execute , while reverses ().
- Temporal windows: block() ; and block() , where is a block search window.
- Amount-matching: The ratio must be within to confirm economic linkage.
- Address association: Either same recipient address or both transactions interact with the same pool.
- Exclusion: Pairs where and are mined in the same block are classified as single-chain attacks and omitted.
This formalizes identification of sandwich pairs matching the specification above [(Li et al., 19 Nov 2025), Sec. IV-A].
Empirical Results (Symbiosis, Aug 10–Oct 10 2025)
| Metric | Value | Note |
|---|---|---|
| Cross-chain swaps analyzed | 60,130 | |
| Valid swaps (filtered) | 37,649 | 95% had s |
| Detected sandwich pairs | 316,809 | |
| Single-chain sandwiches | 269 | 0.085% of total |
| Total bridged volume | \$412,632,065 | Filtered set |
| Attacker profit (excl. gas) | \$5,273,857 | 1.28% of bridged volume |
| Largest individual profit | \$20,284 | |
| Unexploited profit (estimated) | \$1,425,500 | |
| Most attacked pool | BUSD–WBNB (PancakeSwap) | 57.65% attacks, 60.1% attacked vol. |
The Ethereum→BSC route accrued \$2,096,164 profit (0.85% of volume), Base→BSC \$1,447,602 (1.6%), and Arbitrum→BSC \$337,532 (0.99%). Cross-chain sandwiches comprised the overwhelming majority of all sandwich profit versus single-chain counterparts, which earned only \$6,109 (0.12% of total) (Li et al., 19 Nov 2025).
Empirical parameter estimates: , , , , aggregate . Attackers placed and in immediate proximity to source and destination events, affirming the theoretical model [(Li et al., 19 Nov 2025), Fig. 9].
5. Limitations of Existing Defenses
Prevailing MEV mitigation frameworks—including proposer/builder separation (PBS) [Yang '25], fair transaction ordering [Kelkar '20/'22/'23], and encrypted/private mempool mechanisms [Choudhuri '24/'25]—are effective only at or after the point becomes mempool-visible or block-inclusion is determined on the destination chain. Since the critical leak occurs on S, before D is engaged, these tools are structurally incapable of protecting against cross-chain sandwich attacks:
- PBS cannot prevent from being included before on D.
- Fair ordering only governs transactions visible at D’s consensus time.
- Mempool privacy on D offers no protection when S reveals transaction intent openly.
This indicates a fundamental gap: leakage at the cross-chain message layer is orthogonal to defenses focused solely on destination-chain transaction ordering (Li et al., 19 Nov 2025).
6. Mitigation Strategies and Protocol Redesign
Mitigating cross-chain sandwich risk requires protocols to eliminate or severely restrict the emission of actionable calldata from the source chain. Potential mitigations include:
- Private Relayers: Transmitting off-chain only to trusted relayers prevents public leaks but introduces centralization and trust issues.
- Encrypted Events and Off-Chain Decryption: On-chain events are published in encrypted form, with execution on D triggered by a threshold decryption committee. This approach incurs complexity and on-chain cost.
- Destination-Side Path Computation: Only generic swap intents are emitted on S, with the routing/pool selection deferred to on-chain DEX aggregators at execution on D. This makes pool-guessing futile for attackers.
- Time-Lock Commitments: Users submit hash commitments to swap details on S, revealed only after a short time delay less than , so adversaries cannot reconstruct full calldata ahead of D's mempool arrival.
All effective strategies aim to sever the information flow from S to public observers prior to D’s mempool admission, fundamentally altering the risk surface for multi-chain MEV (Li et al., 19 Nov 2025).
7. Significance and Research Implications
Cross-chain sandwich attacks demonstrate critical emergent vulnerabilities as DeFi infrastructure integrates cross-chain composability and liquidity. The observed profits (\$5.27M, 1.28% of bridged value in two months) and systemic bypass of all existing MEV defenses highlight the urgent need for bridge and DEX designers to reconsider message flows and on-chain data exposure (Li et al., 19 Nov 2025). Current research establishes formal models for attacker behavior, supplies robust detection methodologies, and suggests protocol-level countermeasures, but secure-by-design interoperability remains an open challenge. A plausible implication is that further deployment of liquidity-pool bridges without redesign may materially worsen MEV extraction and user harm in multi-chain ecosystems.