🐛 | Bug Bounties
Last updated
Last updated
The EasyX bug bounty programs primarily concentrate on identifying vulnerabilities in our smart contracts, websites, and apps. Our main objective is to prevent any potential loss of user funds, whether it's through direct draining of locked funds or social engineering attacks that manipulate users into redirecting or signing malicious transactions.
Critical
Up to $10,000 USDС
High
Up to $5,000 USDС
Low
Up to $500 USDС
Bug Levels explained
Critical
The bug causes a potential & notable loss of funds for the user and/or the platform.
High
Serious impact on the usage of the product.
A large number of users, products, or items is concerned.
Non-trivial functionality is broken or unavailable, and no workaround exists.
Low
Minimal impact on the usage of the product.
The product shows unintended behavior, but the general usage is not affected.
Few users, products, or items are concerned.
A feature/piece of functionality is broken or unavailable, but an easy workaround solves the problem.
The following vulnerabilities are excluded from the rewards for this Bug Bounty program:
Attacks that the reporter has already exploited themselves, leading to damage
Attacks requiring access to leaked keys/credentials
Attacks requiring access to privileged addresses (governance, strategist)
Any testing with mainnet or public contracts; all testing should be done on private testnets
Attempting phishing or other social engineering attacks against our employees and/or customers
Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
Any denial of service attacks
Automated testing of services that generates significant amounts of traffic
Public disclosure of an unpatched vulnerability in an embargoed bounty
Theoretical vulnerabilities without any proof or demonstration
Content spoofing / Text injection issues
Captcha bypass using OCR
CSRF with no security impact (logout CSRF, change language, etc.)
Server-side information disclosure such as IPs, server names, and most stack traces
Vulnerabilities used to enumerate or confirm the existence of users or tenants
Vulnerabilities requiring unlikely user actions
Vulnerabilities primarily caused by browser/plugin defects
Any vulnerability exploit requiring CSP bypass resulting from a browser bug
URL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)
Attacks requiring privileged access from within the organization
Please submit any of the bugs you find on EasyX using this link here.