Polygon FastLane
  • What is Polygon FastLane?
    • Overview
    • Design Principles
    • Components
    • Component Diagram
  • Getting Started as a Validator
    • Getting Started as a Validator
    • Connecting to a FastLane Sentry Node
      • Finding Your Enode Address & Peer ID
      • Adding FastLane as a Static Peer
    • Patching Your Sentry Nodes With The FastLane Patch
      • Installing from source
        • Patch Download
        • Patch Installation
      • Installing from packages
  • Withdrawing Validator Revenue
    • Validator Vault
      • Connect an Eligible Wallet
      • Revenue Redemption (withdrawal)
  • Searcher Guides
    • Getting Started as a Searcher
      • Solver Call Data
      • Submission Methods
      • Migration Guide for Searchers
    • Bundles (Backruns)
      • Bundle Format
      • Bid Submission
      • Bundle Requirements
      • Full Example
      • Subscribe Events
    • 4337 Bundles Integration Guide
      • Overview
      • How it works
      • RPC Reference
      • Examples
    • Searcher Contract Integration
      • Safety Considerations
      • atlasSolverCall
      • Direct Implementation
      • Proxy Implementation
      • Solver Concepts
      • Altas Bonding Concept
      • Bond atlETH
      • Estimating Solver Gas Charges
    • Addresses & Endpoints
    • Helpers
    • Common Mistakes
    • Atlas SDK's
  • Tools and Analytics
    • FastLane Bundle Explorer
      • Features Overview
      • Key Components
      • Usage Example
      • Error Codes & Troubleshooting
  • Key Concepts
    • Transaction Encoding
  • INFRASTRUCTURE
    • Health Status Endpoint
  • Reference
    • Relay JSON-RPC API
    • Relay REST API
    • Glossary of Terms
Powered by GitBook
On this page
  • 1. Restrict Unauthorized Access:
  • 2. Verify Caller Identity:
  • 3. Implement Solver call to be private
  1. Searcher Guides
  2. Searcher Contract Integration

Safety Considerations

Not getting REKT 101

Searchers must ensure the following security measures are in place to safeguard their contract interactions:

1. Restrict Unauthorized Access:

Ensure that only trusted contracts, such as the designated Atlas contract, can execute sensitive functions. Unauthorized access checks help prevent exploitation from untrusted or malicious actors attempting to interact with critical contract features. if (msg.sender != _atlas) revert InvalidEntry();

2. Verify Caller Identity:

Always confirm the caller’s origin to restrict sensitive actions to authorized accounts only. By implementing identity checks, searchers protect their contracts from external interference by unauthorized sources. if (solverOpFrom != _owner) revert InvalidCaller()

3. Implement Solver call to be private

Ensure that the function performing the backrun is not accessible externally. Implement whitelisting to limit access, as demonstrated in our example.

Regardless of whether the searcher uses a direct or proxy implementation, explicit access and security checks must be applied.

Verify that the solverOpFrom address supplied as the first argument in atlasSolverCall is properly permissioned.

Please see the next two sections for examples of these checks.

PreviousSearcher Contract IntegrationNextatlasSolverCall

Last updated 6 months ago