Can a Centralized Exchange (CEX) Environment Be Exploited by a Sandwich Attack?

A true sandwich attack, as defined in DeFi, cannot occur on a CEX because CEXs do not have a public mempool and use a deterministic price-time priority matching engine. The CEX controls the order flow, preventing external bots from observing and manipulating the queue.

However, a CEX insider with privileged information could theoretically replicate the effect of a sandwich attack by front-running a large client order, though this would be classified as insider trading and market manipulation.

What Is the Role of an Exchange’s Matching Engine in Ensuring Market Fairness?
What Is the Risk of a Liquidation Engine ‘Front-Running’ the Market?
How Does a CEX Ensure Fair Transaction Ordering without a Public Mempool?
How Does an Exchange’s Matching Engine Affect the Execution Quality of a Complex Spread?
Does a CEX Utilize a Mempool Concept, and If So, How Is It Different from a Blockchain Mempool?
What Is the Role of a Matching Engine in a Centralized Exchange?
Define “Latency Arbitrage” and How It Is Related to the Speed of a Matching Engine
How Does an exchange’S’matching Engine’ Process Different Types of Orders?

Glossar