Discover more from Dose of DeFi
US Treasury goes after DeFi and top MEV bots lose $25m
Plus Odds & Ends and Thoughts & Prognostications
Tweet of the week: DeFi is misunderstood
Regulators have always been playing catchup when it comes to crypto, and after a string of (coordinated) regulatory actions against a wide swath of crypto actors, it seems that the US Treasury is now setting its sights on “DeFi”. The tweet from crypto Twitter maestro, Neeraj sums up a piece written by his colleague Peter Van Valkenburgh. We’ll defer the constitutional questions to CoinCenter, but it is clear from the Treasury’s assessment that it is misconstruing what DeFi actually is vs. those that purportedly use it as a marketing tool.
Regulators target entities that serve as intermediaries to financial activity. It’s easy to target Coinbase or Kraken because it’s a registered company in the US. But what about Uniswap? Regardless of whether regulators legally can or should target it, the simple fact is they can’t. Even if they put Hayden in jail and got all UNI token holders to go along, they simply can’t change the immutable smart contract on Ethereum.
This is not to say they won’t try! For DeFi protocols that rely significantly on governance (all the lending protocols), they can target the token holders themselves and could muster through regulation by commandeering enough governance power.
There is also the very remote possibility that Uniswap could get the Tornado Cash treatment. Tornado Cash is also a set of immutable smart contract on Ethereum that regulators were unable to take down directly, but they achieved the same end by forcing RPC providers and validators to refuse to broadcast or confirm blocks that have transactions that interact with the Tornado Cash smart contracts.
But Tornado Cash reportedly facilitated payments to North Korea. What has Uniswap done?
Chart of the week: Exploiting the arbitragers
A chart that attempts to breakdown how a malicious actor stole $20m from the most profitable MEV bots through an exploit of the Ultra Sound Money Relay because of a vulnerability in mev-boost-relay, the Flashbots-built client MEV searchers and relayers. Bert Miller of Flashbots has a full post-mortem and step-by-step account of how the exploit ocurred. In short, the attacker exploited mev-boost’s commit and reveal scheme by convincing the relay to reveal the contents of a block because, the relay only requires a signed block header but does not check if the block is invalid. Typically, since the block is invalid it would never get confirmed by the beacon chain.
But in this instance, the attacker looked at the contents of the block being proposed and then used this information to propose their own block where it exploited the MEV bots that had submitted transactions in the original bundle.
This was a shock to the MEV community, which typically does the exploiting. MEV godfather (and Flashbots cofounder) Phil Daian said the exploit “demonstrates the true power of having in-protocol [Proposal Builder Separation] + [Single Slot Finality] one day, while also showing that there's some work to do to get there :)”
Odds & Ends
Euler exploiter returns $177m in stolen funds Link
Sushi Head Chef releases statement on SEC subpoena Link
DeFi Saver launches DCA and limit orders on Ethereum Link
CoW Swap launches RPC endpoint to protect against MEV Link
OpenEden launches regulated on-chain vault managing US Treasuries Link
GFX Labs launches Google Sheets add-on to query on-chain data Link
Thoughts & Prognostications
Q1 2023 market wrap [Kyle Waters & Matías Andrade/Coin Metrics]
Etherscan: The Master of Block Explorers [Marco Manoppo/Pensive Pragmatism]
On Blockchain Valuations [Lewis Harland/Decentral Park Research]
How to identify MEV transactions through on-chain data [EigenPhi]
The zkEVM race is here [Tom Wan/21Shares]
How Pancake Swap v3 differs from Uniswap v3 [Ignas/DeFi Research]
That’s it! Feedback appreciated. Just hit reply. Written in Texas, but my heart is in Nashville with the Tennessee Three.