Skip to content

Jito Bundles

Every swap submitted through Venum is protected against sandwiching by default via Jito's block engine infrastructure.

The Problem

When you submit a swap via standard Solana RPC, your transaction enters the public mempool where searchers can:

  • Sandwich attack — Buy before your swap (frontrun), then sell after (backrun), profiting from the price impact you created
  • Frontrun — Detect your pending swap and execute the same trade ahead of you

This typically costs users 0.1-1% of their swap value.

How Venum Protects You

  1. Jito sendTransaction — Your signed transaction is sent directly to Jito's block engine, not the public mempool
  2. Multi-region submission — Sent to 5 Jito endpoints simultaneously (NY, Amsterdam, Frankfurt, Tokyo, mainnet) for maximum inclusion probability
  3. Atomic execution — The transaction either executes as-is or fails entirely — no partial execution that searchers can exploit
  4. No bundling with arb TXs — Venum never bundles your transaction with arbitrage transactions

What This Means in Practice

  • Your swap lands at the price you quoted, minus slippage tolerance
  • No value extraction by third parties between quote and execution
  • Higher effective output compared to unprotected submission