🐛 | Bug Bounties

The EasyX bug bounty programs primarily concentrate on identifying vulnerabilities in our smart contracts, websites, and apps. Our main objective is to prevent any potential loss of user funds, whether it's through direct draining of locked funds or social engineering attacks that manipulate users into redirecting or signing malicious transactions.

Website and Apps (Level - Payout)

Bug Level Payout

Critical

Up to $10,000 USDС

High

Up to $5,000 USDС

Low

Up to $500 USDС

Bug Levels explained

Critical

  • The bug causes a potential & notable loss of funds for the user and/or the platform.

High

  • Serious impact on the usage of the product.

  • A large number of users, products, or items is concerned.

  • Non-trivial functionality is broken or unavailable, and no workaround exists.

Low

  • Minimal impact on the usage of the product.

  • The product shows unintended behavior, but the general usage is not affected.

  • Few users, products, or items are concerned.

  • A feature/piece of functionality is broken or unavailable, but an easy workaround solves the problem.

Out of Scope Bounties & Rules

The following vulnerabilities are excluded from the rewards for this Bug Bounty program:

  • Attacks that the reporter has already exploited themselves, leading to damage

  • Attacks requiring access to leaked keys/credentials

  • Attacks requiring access to privileged addresses (governance, strategist)

  • Any testing with mainnet or public contracts; all testing should be done on private testnets

  • Attempting phishing or other social engineering attacks against our employees and/or customers

  • Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)

  • Any denial of service attacks

  • Automated testing of services that generates significant amounts of traffic

  • Public disclosure of an unpatched vulnerability in an embargoed bounty

Websites and Apps

  • Theoretical vulnerabilities without any proof or demonstration

  • Content spoofing / Text injection issues

  • Captcha bypass using OCR

  • CSRF with no security impact (logout CSRF, change language, etc.)

  • Server-side information disclosure such as IPs, server names, and most stack traces

  • Vulnerabilities used to enumerate or confirm the existence of users or tenants

  • Vulnerabilities requiring unlikely user actions

  • Vulnerabilities primarily caused by browser/plugin defects

  • Any vulnerability exploit requiring CSP bypass resulting from a browser bug

  • URL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)

  • Attacks requiring privileged access from within the organization

Please submit any of the bugs you find on EasyX using this link here.

Last updated