mevchan
MEV-resistant relayer for Solana
Protect your transactions from front-running and sandwich attacks. mevchan combines zero-knowledge proofs with encrypted bundle submission to shield your intent before execution—with zero relayer fees and no Jito tips.
Zero-Fee Relaying
Route through mevchan with 0% relayer fee and no Jito tip for the demo layer.
Private Bundles
Submit encrypted bundles via our relayer endpoints to shield pre-execution intent.
MEV-Resistant Flow
Lower information leakage from user → relayer → validator → program.
How It Works
Client ZK Proofs
Build proofs in the browser; reveal only what's required.
Encrypt Payload
Encapsulate proof + minimal data for the relayer.
mevchan Relayer
Submit as a private bundle with 0% fee, no jitotip.
On-chain Verify
Your Solana program verifies and writes minimal state.
Features
- Composable client-side ZK circuit templates
- Deterministic inputs with opt-in reveal
- Private bundle submission endpoints (demo)
- Program-level verification patterns (docs)
- Priority fee quoting + route hints (demo)
- Familiar Solana SDK workflow (conceptually compatible)
Playground
Sample Requests
// Response will appear here
Docs
What is mevchan?
mevchan is a conceptual MEV-protection layer built on top of Jito's relaying model. It combines client-side ZK proofs, encrypted bundle submission, and on-chain verification to reduce pre-execution signal leakage—without fees or jitotip in this demo layer.
Security Model (demo)
This site demonstrates flows with mock endpoints. Use audited circuits and programs for production.
Example Flow
POST /hash→ derive commitmentPOST /prove→ produce proofPOST /verify→ check proofPOST /bundle/submit→ encrypted payload routed without jitotip- On-chain program verifies → updates state