Jito Bundles
Every swap submitted through Venum is protected against sandwiching by default via Jito's block engine infrastructure.
The Problem
When you submit a swap via standard Solana RPC, your transaction enters the public mempool where searchers can:
- Sandwich attack — Buy before your swap (frontrun), then sell after (backrun), profiting from the price impact you created
- Frontrun — Detect your pending swap and execute the same trade ahead of you
This typically costs users 0.1-1% of their swap value.
How Venum Protects You
- Jito sendTransaction — Your signed transaction is sent directly to Jito's block engine, not the public mempool
- Multi-region submission — Sent to 5 Jito endpoints simultaneously (NY, Amsterdam, Frankfurt, Tokyo, mainnet) for maximum inclusion probability
- Atomic execution — The transaction either executes as-is or fails entirely — no partial execution that searchers can exploit
- No bundling with arb TXs — Venum never bundles your transaction with arbitrage transactions
What This Means in Practice
- Your swap lands at the price you quoted, minus slippage tolerance
- No value extraction by third parties between quote and execution
- Higher effective output compared to unprotected submission
