What if the attacker is using MEV protection RPCs to steal funds?
FailSafe is aware of the potential for attackers to use MEV protection RPCs to steal funds. Through our partnerships with private transaction services, we currently have visibility into these private transactions. To enhance our security measures and prevent fraudsters from exploiting this avenue, we are developing an "exceptions list" mechanism. This system, in collaboration with mempool service providers, will allow end users to opt-in for automatic dropping of any privately proposed transactions involving their wallet addresses. This proactive approach will significantly reduce the risk of unauthorized transactions and protect our users' assets from being transferred through privacy-preserving tools.
PreviousWhat happens if an attacker uses an abnormally high gas fee?NextIs the FailSafe Recovery Vault wallet safe? Can it be exploited?
Last updated