Bug Bounty
Last updated
Last updated
Itheum is a fully open source, omni-chain protocol that's powered by multiple open source smart contracts and dapps.
A bug bounty program is being put into place to enable social developers and engineers to responsibly disclose security issues in exchange for a reward.
Rewards are distributed according to the impact of the vulnerability based on the This is a simplified 5-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
All bug reports must include a Proof of Concept (PoC) demonstrating how the vulnerability can be exploited to impact an asset-in-scope to be eligible for a reward. Critical and High severity bug reports should also include a suggestion for a fix. Explanations and statements are not accepted as PoC and code is required.
Payouts are handled by the Itheum team directly and are denominated in USD. However, payouts are done in ITHEUM.
The reward amounts are being finalized, but reach out to us bugbounty@itheum.io in the meantime for reward amount specifics.
Email us on bugbounty@itheum.io
MultiverX Bridge Deposit Smart Contract
Token bonding for Liveliness to mint Data NFTs
Data NFT marketplace (Data Market)
Data NFT Minting Smart Contract
Solana Bridge Deposit Program
The following vulnerabilities are excluded from the rewards for this bug bounty program:
Attacks that the reporter has already exploited themselves, leading to damage
Attacks requiring access to leaked keys/credentials
Attacks requiring access to privileged addresses
Smart Contracts and Blockchain
Basic economic governance attacks (e.g. 51% attack)
Lack of liquidity
Best practice critiques
Sybil attacks
Centralization risks
The following activities are prohibited by this bug bounty program:
Any testing with mainnet or public devnet contracts; all testing should be done on private testnets
Attempting phishing or other social engineering attacks against our employees and/or customers
Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
Any denial of service attacks
Automated testing of services that generates significant amounts of traffic
Public disclosure of an unpatched vulnerability in an embargoed bounty