Morph and MEV: Protecting Users from Hidden Value Extraction