Zilliqa

  • $150 – $5,000 per vulnerability
  • Safe harbor
  • Managed by Bugcrowd

Program stats

22 vulnerabilities rewarded

Validation within 1 day
75% of submissions are accepted or rejected within 1 day

Latest hall of famers

Recently joined this program

Zilliqa is enabling new decentralized business models which remove middlemen and inefficiencies. The trustless connections formed on Zilliqa’s blockchain are creating new ways of interacting and trading with each other and we’ve only just begun unfolding the possibilities.

Zilliqa invites you to test and help secure our primary publicly facing assets - focusing on our cryptocurrency platform and smart contract language/implementation. We appreciate your efforts and hard work in making the internet (and Zilliqa) more secure, and look forward to working with the researcher community to create a meaningful and successful bug bounty program. Good luck and happy hunting!


Ratings/Rewards:

Bonus:

From 10/15-10/25. All rewardable submissions will receive an additional 20% in payout.

For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy.

NOTE: Vulnerabilities that are not included within the VRT will be rewarded in a different manner as described below.

It is important to note that in some cases, a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full and detailed explanation will be provided to the researcher, along with the opportunity to appeal and make the case for a higher priority.

This program contains some repositories that need to be assessed in code and with the installation of the testnet. Vulnerabilities concerning the code itself or testnet will be rewarded based on the table as shown below.

Vulnerability categories

P1 categories:

  • Remote Code Execution of a Zilliqa node
  • Remote Code Execution of a Zilliqa lookup node
  • Any methods of siphoning or creating funds

P2 categories:

  • Remote Code Execution of the Zilliqa Savant IDE
  • Security bugs or issues in the cryptography relating (Non third-party) to key generations, encryption, decryption, signing, and verification
  • Smart Contract vulnerabilities that can destabilize all DApps within the ecosystem

P3 categories:

  • Denial of Service (termination of process) to a Zilliqa lookup node
  • Denial of Service (termination of process) to a Zilliqa node
  • Denial of Service (termination of process) to the Zilliqa Savant IDE

P4 categories:

  • Denial of Service (unable to progress with the consensus protocol) to a Zilliqa lookup node
  • Denial of Service (unable to progress with the consensus protocol) to a Zilliqa node

Reward table

Rating Binary/CodeReview VRT Submission Rewards
P1 $3000 - $5,000 $2100 - $2500
P2 $1500 - $3,000 $1200 - $1500
P3 $500 - $1,500 $500 - $1200
P4 $200 - $800 $150 - $500

Targets

In scope

Target name Type
The Zilliqa codebase and local testnet (https://github.com/Zilliqa/Zilliqa) Other
The scilla codebase and local testnet (https://github.com/Zilliqa/scilla) Other
The savant-ide codebase (https://github.com/Zilliqa/savant-ide) Other
https://savant-ide.zilliqa.com Website
Zilliqa Javascript library (https://github.com/Zilliqa/Zilliqa-JavaScript-Library) API
Moonlet-core JS library (https://github.com/cryptolandtech/moonlet-core/releases/tag/v0.0.1) Other
Moonlet wallet Chrome extension (https://github.com/cryptolandtech/moonlet/releases) Other
Zilliqa testnet wallet (nucleus wallet) codebase (https://github.com/Zilliqa/nucleus-wallet) Other
https://dev-wallet.zilliqa.com/ Website
https://learnscilla.com/ Website

Any domain/property of Zilliqa not listed in the targets section is out of scope. This includes any/all subdomains not listed above.

Target Info

1) Zilliqa: https://github.com/Zilliqa/Zilliqa

2) Scilla: https://github.com/Zilliqa/scilla

3) Zilliqa Javascript library: https://github.com/Zilliqa/Zilliqa-JavaScript-Library

4) Savant-IDE:
https://github.com/Zilliqa/savant-ide
https://savant-ide.zilliqa.com

5) Moonlet-core library: https://github.com/cryptolandtech/moonlet-core/releases/

6) Moonlet wallet Chrome extension: https://github.com/cryptolandtech/moonlet/releases/

7) Zilliqa testnet wallet (nucleus wallet)
https://dev-wallet.zilliqa.com
https://github.com/Zilliqa/nucleus-wallet

8) Zilliqa testnet (for security testing): https://dev-api.zilliqa.com ¹ ²
¹ The testnet used for security may not be the latest version of the codebase.
² Please use the testnet faucet wallet (https://dev-wallet.zilliqa.com) to generate an account address and receive 300 testnet ZIL tokens.

9) Interactive Tutorial https://learnscilla.com/
When logging in into this target you'll notice that you're redirected through https://learn-scilla.firebaseapp.com/. While that subdomain is in scope, no other subdomains under firebaseapp are.


Access:

Researchers will be testing their local testnet version of Zilliqa/Scilla, in addition to savant-ide.zilliqa.com.


Credentials:

Researchers will be able to generate their own private/public keys if they are starting up their own local testnet. Additionally, researchers could use the Zilliqa testnet faucet wallet (https://dev-wallet.zilliqa.com) linked above to generate a private/public key pair if they wish to use the provided Zilliqa testnet.


Focus Areas:

  • Full Denial of Service to the testnet
  • Remote Code Execution of the Zilliqa Wallet
  • Cross Site Scripting and Cross Site Request Forgery for Moonlet wallet Chrome extension

Documentation:

Documentation regarding updates and new features can be found on the program updates page


Out-of-Scope

  • Production versions of Zilliqa and Scilla are out of scope for this bounty program
  • Auxiliary utilities of Zilliqa found in src/cmd of the Zilliqa repository
  • Hosting infrastructure of security testnet (AWS, Kubernetes)
  • Distributed denial of service is out of the scope for this bounty program
  • Eclipse attack on the network
  • Clickjacking on pages with no sensitive actions.
  • CSRF with no sensitive actions.

Coordinated Public Disclosure

Before disclosing an issue publicly we require that you first request permission from us. Zilliqa will process requests for public disclosure on a per report basis. Requests to publicly disclose an issue that has not yet been fixed for customers will be rejected. Any researcher found publicly disclosing reported vulnerabilities without Zilliqa's written consent will have any allocated bounty withdrawn and disqualified from the program.

Safe Harbor:

When conducting vulnerability research according to this policy, we consider this research to be:

  • Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
  • Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
  • Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
  • Lawful, helpful to the overall security of the Internet, and conducted in good faith.
  • You are expected, as always, to comply with all applicable laws.

If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through this program, or inquire via support@bugcrowd.com before going any further.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.