本次以太坊Merge时出现了很多无风险套利的机会,其中有科学家团队声称在此次套利行动中获利近1万个ETHW(约20万刀),套利方式主要是用USDC这类无价值代币套取流动性池中有价值代币,其分享的零撸20万刀的文章也在社区引起了广泛讨论。
There are many risk-free arbitrage opportunities that have emerged at the time of this time in the Taiye Merge, in which teams of scientists claim to have benefited from this arbitrage operation by close to 10,000 ETHWs (approximately 200,000 knives), mainly in the form of valuable tokens, such as USDC, for liquid pools, whose share of zero 200 thousand dollars has also been widely discussed in the community.
OKLink链上卫士团队对这次套利行为进行了手法解析和数据统计,套利者总计获得了超过217,129个ETHW的收益。此外,发现该科学家团队控制的 0xefe09d0c045096661df2092a8dd9845d8cc0c947 在此次分叉套利的获利榜单中仅排名第三,排名第一的地址获利接近它的3倍。
In addition, ranked three times closer to in this profit list.
下面,我们就带大家来盘一盘哪些地址,用什么手法获利最多?漏洞在哪?套利窗口期有多长?以及是否存在一些工具可以在第一时间发现这类风险?
Now, what are we going to do with a plate of addresses, and the most profitable? Where are the holes? How long is the arbitrage window? and whether there are some tools that can detect such risks in the first place?
首先,我们需要了解为什么USDC在ETHW链上是“劣币”。
First, we need to understand why USDC is “bad currency” on the ETHW chain.
EthereumPoW链(后简称ETHW)是本次以太坊POS共识升级中,社区的一些不想放弃PoW丰厚利润的矿工继续采用原有共识机制继续出块。
The EtheumPoW chain (hereinafter ETHW) is the current upgrading of the community's Pos consensus, whereby some miners who do not want to give up PoW's lucrative profits continue to make progress using the original consensus mechanism.
区块链分叉需要复制所有现有功能、钱包余额、资产和智能合约。这意味着在以太坊上运行的所有资产现在都将在 EthereumPoW主网上运行。由于社区对ETHW和ETF等分叉链网络的价值认可度较低,因此很多分叉链代币也沦为“欢乐豆”。
Block chains need to replicate all existing functions, wallet balances, assets, and smart contracts. This means that all assets operating on the EtheriumPoW main network will now run.
中心化的稳定币项目方(如USDT、USDC等)表示不会承认除ETH主链(POS)外其他以太坊链上的稳定币(影子)资产,原因是现实世界中背书稳定币价值的美元数量不会“分叉”。所以,中心化交易所不会提供ETHW链USDT/USDC的充值地址。
Centralized currency stabilization projects (e.g. USDT, USDC, etc.) have indicated that they will not recognize stable currency (shadow) assets in the Tails chain other than the ETH main chain (POS), because the number of US dollars in the real world that endorse the value of the stable currency will not “sharp” . So the centralized exchange will not provide a full value address for the ETHW chain USDT/USDC.
套利点出现了~
{\bord0\shad0\alphaH3D}The arbitrage appears. {\bord0\shad0\alphaH3D} {\bord0\shad0\alphaH3D}
虽然在ETHW链上的USDT价值为0,但作为ETHW链上为数不多有价值的资产——ETH(W),流动性池(LP)中忘记提走的ETH或WETH就被套利者盯上,当作了这次的获利对象。套利者通过向含有ETH(W)的LP中充入USDT/USDC或其它无价值代币,“购买”有价值的ETH(W),最终将ETHW转向交易所提现离场。
While the USDT value on the ETHW chain is zero, as a small number of valuable assets on the ETHW chain — ETH(W), the ETH or WETH that was omitted from the LP
总的来说,这是一种用无价值代币在流动性池中套取有价值代币的套利操作。
In general, this is a arbitrage in which the value of the currency is taken in a liquidity pool with no value in exchange.
我们选择了深度较好的8个流动性池:UniswapV2&V3和Sushiswap两大DEX中USDT-WETH、USDC-WETH、WBTC-WETH,来统计获利金额。
We have selected eight more sophisticated liquid pools: UniswapV2&V3 and Sushiswap, two DEXs, USDT-WETH, USDC-WETH, WBTC-WETH, to calculate the profitability.
0撸20万作者的地址(0xefe)在此次的统计中获利9,779.3个ETHW,仅排名第三。而排名第一的 0x3dc 获利是 0xefe 的2.7倍:26,541.8个ETHW,可谓闷声发大财!
The address of 200,000 authors (
注:No.4和No.10地址使用的是同一个套利合约;
Note: Nos. 4 and 10 addresses are under the same arbitrage contract;
说明:由于本次统计的6个流动性池的ETH基本于9月25日前被套干,所以以上数据的统计范围是9月15日~9月25日;此次获利统计未扣除交易中的gas fee(ETHW)。
Note: Since the ETH of the six liquid pools of the present statistics was largely dry by 25 September, the statistical coverage of the above data is 15 September to 25 September; this profit count does not deduct the gas feed (ETHW) in the transaction.
此次ETHW分叉套利手法主要分为两类:
This ETHW split-fork arbitrage is divided into two main categories:
1)和DEX的Router地址交互(构建DEX前端),用影子资产从LP中套出ETH(W)
1) Interact with Route (building DEX frontend) & extract ETH(W) from LP with shadow assets
2)构建套利合约,由一个或多个地址提供初始资金(无价值的影子资产,如UDSC),合约执行多次多流动性池的套利,过程中由合约收集LP中的WETH,由DEX的Router合约将WETH转化为ETH打入套利合约地址,最后从套利合约中转入获利地址ETH(W)
2) Construction of a arbitrage contract with one or more addresses (unvalued shadow assets such as UDSC) to provide initial funds , implementation of multiple multi-mobility pool arbitrage in which collects Weth from LP, conversion of Wether from DEX's Router contract into an arbitrage contract address and, finally, transfer from arbitrage to profit address ETH (W)
两种套利手法在操作上都可以分为两步:准备影子资产 → 充入池子套取ETHW
.
下面,我们获利Top10的地址中选取两个地址作为两类套利手法的代表进行分析:
The following is an analysis of the two addresses selected as representatives of two types of arbitrage at the address where we profit from Top10:
No.1: 0x3dca
a. 准备影子资产
a. Preparation of shadow assets
地址0x041和0xb00授权套利合约0xb98提取USDC
Address: and
提前借入stETH和USDC,供0xb98调用
Explosion in advance of stETH and USADC for 0xb98 call
b. 充入池子套取ETHW
b. Filling the pool with ETHW
9月15日22:16地址0xf6a在交易(0xd6a)中创建了0xb98的套利合约,分别由
15 September: 16 September at
图片来自:OKLink ETHW浏览器交易0xd6ab交易详情页 Photo by: OKLink ETHW Browser
* 此次统计范围内套利合约总计为套利者提供了217,129.7个ETHW的收益。由于此次统计的流动性池数量有限,套利者实际的获利金额会多于这一数值。 * A total of 217,129.7 ETHW benefits from the arbitrage contract < strong > within the scope of the statistics < / strong >. As a result of the limited number of liquid pools in the statistics, the arbitrager actually earns more than this value. 从上面的统计我们可以得出: From the above statistics, we can tell: 1)调用Router合约进行套利是多数人的选择; 1) The arbitrage of the Router contract is the choice of the majority ; 2)一些在Merge创建的合约调用次数较少,很显然是个别套利者这次单独定制的套利合约; 2) Some contracts created in Merge have fewer calls, and it is clear that the individual arbitrage arbitrage contract was customized this time alone ; 3)一些较早创建的套利合约仍能在分岔中完成套利,可见此类套利手法早已出现,且可复用; 3) Some of the earlier-created arbitrage contracts can still be arbitrage in between, as can be seen in the emergence of such arbitrage that can be reused ; 0撸20万的作者地址0xefe的操作同样分为前期准备和分叉后的套利操作。 The operation of 200,000-dollar author addresses 0xefe is also divided into arbitrage after pre-preparation and fork. 首先从9月14日开始,套利的前期影子资产全部由0xab9(200528.eth)的地址在OKX等三家中心化交易所提取后发送至0xefe,分别是7.58个BTC、2,099,990个USDC、42,996个USDT。 First, starting on 14 September, all pre-discounted shadow assets were sent from 0xab9(28.eth) to 0xefe at three centralized exchanges, including OKX, 7.58 BTCs, 2,099,990 USDDCs, 42,996 USDTs. 在0xefe地址总计90次套利行为中,我们选取单次获利最多(926ETHW)的一次进行操作分析(hash=0xc35707d5ffe1741c009186ff48659c391e6944fe62b8f534d3b70ee8cdf09cf1): Out of a total of 90 arbitrage actions at 0xefe, we selected one of the most profitable single transactions (926ETHW) (hash=0xc357d5ffe1741c00186ff4859c391e6944fe62b8f534d3b70e8cdf09cf1): 首先,本次交易的接收方是Uniswap V3的Router地址,所以我们猜测该操作可能是通过仿制Uniswap的前端手动完成的。0xefe通过前期准备的2,099,990个USDC换成WBTC,在从流动性池WBTC/WETH(流动性充足)中套取WETH,最后经过Router合约兑换成926个ETHW。 First, the recipient of the transaction is the address of the Louter of Uniswap V3, so we suspect that the operation could have been done manually by imitating the front end of Uniswap. 0xefe replaced 2,099,990 USDCs with WBTCs, replacing WTHs with WBTCs/WETHs from the liquidity pool, and finally converted to 926 ETHWs through the Router contract. 我们观察的8个含有ETH的主要流动性池的大部分ETH在9月15日和16日两天几乎被劣币USDC和USDT套干,获利较多的几个套利者几乎都是在首个ETH PoW区块(即9月15日22:11)的第一时间开始的,例如No.1地址的主要套利交易发生在ETHW首个区块后的5分钟。最终在9月23日逐渐结束套利(如No.4地址),也就是说此次LP套利的窗口期有9天。 Most of the eight ETHs that we have observed containing ETH's main liquidity pool were almost dryed by USDC and USDT on 15 and 16 September, and several of the more profitable arbitrators started almost at the first time of the first ETH PoW block (i.e. 22:11 September), for example, the main arbitrage at No.1 addresses took place five minutes after the first ETHW block. The arbitrage (e.g. No. 4) was eventually phased out on 23 September, i.e. 数据来源:OKLink链上卫士 Data source: OKLink chain guard 然而,这种“劣币套良币”的套利手段此次并非首创,一些项目方在跑路前也经常使用相同的手段,把项目代币的池子中的稳定币或ETH换走。OKLink链上卫士的风险代币检测功能(TokenScanner)持续对链上数据进行监控和分析,通过独有的【获利地址】指标监控流动性池的头部获利地址。 However, this “strong” arbitrage of bad currency
通过风险代币检测的工具,可以时刻关注我们做市的DEX的流动性情况,一旦流动性快速下跌可以第一时间快速撤出资产,防止被Altcoin套光主流资产。 By means of a risk token test tool, attention can be paid to the liquidity of the DEX in our city at all times, allowing for rapid withdrawal of assets as soon as liquidity drops and preventing the diversion of mainstream assets by Altcoin. 除DEX流动性和获利地址信息外,风险代币页面还提供了做市商以及购买者、出售者信息,套利者通常会到池子里面把市场价值低的代币批量卖出,然后换成稳定币或者某些主链币相对来说高价值易于在市场上抛售。如果做市过于集中,则说明存在代币所在DEX流动性被恶意操纵的可能。 In addition to DEX liquidity and profit address information, the risk currency page also provides as a marketer and as a buyer and seller
同时卫士提供代币分类器,其中针对发生跑路的代币打上【Rugpull】标签,帮助用户快速识别风险和可疑地址。 At the same time, the guards provide a money classifier with a [Rugpull] label for running money to help users quickly identify risks and suspicious addresses. 总体来说,链上卫士的风险代币检测是一款功能强大的风险代币扫描工具,具备3大基本能力:风险分析、代币分类器、安全分数。目前该功能已经支持9条链和13个主流DEX检测,(页面仅支持BSC和ETH,其余链在接入中)累计扫描418万个代币,目前发现161,940 个风险代币。在新的页面视觉中,增加了代币的DEX流动性池信息、治理信息、OKlink审核相关链接。在风险项目来源方面,我们从我们的SEC风险事件数据库和审核服务流程中获取信息。钱包等资产服务商也可以通过联系 audit@oklink.com,接入OKLink的OpenAPI使用我们的服务。 Overall, currently supports 9 chains and 13 mainstream DEX tests (pages only support BSC and ETH, the rest of which are in access) for a cumulative scan of 4.18 million odes and currently find 161,940 risk tokens. adds three basic capabilities to the new page vision: DEX liquidity pool information, governance information, OKlink audit-related links. In terms of risk project sources, asset service providers such as wallets can also access No.3:0xefe
套利窗口期
注册有任何问题请添加 微信:MVIP619 拉你进入群
打开微信扫一扫
添加客服
进入交流群
发表评论