SlowMist analysis shows that the problem with MEV robots being attacked is that even if the beacon block is incorrect, the relay still returns the payload to the proposer, resulting in the proposer being able to access the block content before another block is finalized. The attacker takes advantage of this problem to maliciously construct an invalid block, so that the block cannot be verified, and the relay cannot broadcast (the status code is 202) to obtain the transaction content in advance. mev-boost-relay has urgently released a new version to alleviate this problem, and it is recommended that relay operators upgrade the relay in time. Foresight News previously reported that a smart contract developer named 3155.eth on Twitter said that several top MEV robots had been hacked and the loss had reached 20 million US dollars. Substitution thus stealing funds from MEV robots.