In the ever-evolving world of blockchain technology, the ability to monitor and mitigate potential issues is not just a luxury but a necessity.
It’s time we end the Billions of dollars lost to hacks every year.
This post delves into the intersection of blockchain monitoring and Maximum Extractable Value (MEV). We’ll explore the critical phases of issue detection and mitigation, the role of observability and monitoring, and how these concepts apply to blockchain applications.
Then, we see how blockchain incident response is coupled with MEV activities, how these can be used to mitigate hacks, and how “Ethical Censorship” can play a crucial role.
Finally, we will see a quick sketch of how that could look in practice, the challenges with Ethereum (or, more broadly L1s), and how Rollups could be a more suitable environment. We will quickly define the typical Rollup deployment and sketch how to augment it with the hack mitigations we discussed.