Audit
Triaged by Hackenproof

Bluefin Perp Audit Contest: Program info

Bluefin Perp Audit Contest

Company: Bluefin
KYC required POC required
Live
Contest is active now
Program infoReports

Decentralized perpetuals with blazing-fast settlement, backed by @Polychain, BH Digital, SIG, and Tower Research.

In scope
TargetTypeSeverityReward
https://github.com/hackenproof-public/bluefin-dex-contracts-v3
copy
Copy
success Copied

!! Only smart contracts residing in the sources folder are in scope. The rest is there to make testing easier !!

Please contact our support team in Discord to get access to scope.

Smart Contract
Critical
Bounty
Target
https://github.com/hackenproof-public/bluefin-dex-contracts-v3
copy
Copy
success Copied

!! Only smart contracts residing in the sources folder are in scope. The rest is there to make testing easier !!

Please contact our support team in Discord to get access to scope.

TypeSmart Contract
Severity
Critical
RewardBounty

Focus Area

IN-SCOPE VULNERABILITIES

Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.

  • Any governance voting result manipulation
  • Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield
  • Permanent freezing of funds
  • Insolvency
  • Theft of unclaimed yield
  • Permanent freezing of unclaimed yield
  • Temporary freezing of funds
  • Smart contract unable to operate due to lack of funds
  • Block stuffing for profit
  • Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)
  • Theft of gas
  • Unbounded gas consumption
  • Smart contract fails to deliver promised returns, but doesn’t lose value
  • Functional correctness of implementation even if it's not directly impacting user funds
  • Best practices, architectural flaws and other types of issues are included at discretion of Bluefin's team.

OUT OF SCOPE

  • Incorrect data supplied by third party oracles
  • Not to exclude oracle manipulation/flash loan attacks
  • Basic economic governance attacks (e.g. 51% attack)
  • Lack of liquidity
  • Sybil attacks
  • Centralization risks

Program Rules

The following activities are prohibited by this contest event:

  • Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
  • Any testing with pricing oracles or third party smart contracts
  • Attempting phishing or other social engineering attacks against Bluefin employees and/or customers
  • Any denial of service attacks
  • Public disclosure of an unpatched vulnerability in an embargoed bounty
  • Make every effort not to damage or restrict the availability of products, services, or infrastructure
  • Avoid compromising any personal data, interruption, or degradation of any service
  • Localize all tests to your accounts
  • Perform testing only within the scope
  • In case you find chain vulnerabilities we’ll pay only for vulnerability with the highest severity.
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of Bluefin Company without appropriate permission

For more information, check: https://learn.bluefin.io/docs/

Discussion

We use Discord as official communication channel: https://discord.gg/YdTmZuRQ Join the channel, and create #support ticket to be added for conversation.

Disclosure Guidelines

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed for the moment.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • The vulnerability must be a qualifying vulnerability
  • Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through hackenproof.com
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • You must not be a former or current employee of us or one of its contractor.
  • Provide detailed but to-the point reproduction steps

Rewards Distribution

  • Total Prize Pool: $85k USDC
  • 45k is a fixed pot which will be distributed for Low/Medium/High severity issues
  • Additional 40k will be unlocked for critical severity issues discovered: For the purpose of this contest, a critical vulnerability is defined as an issue that enables the theft of substantial user funds or protocol assets.

Please note: Minor or theoretical loss vectors — such as small rounding errors — do not qualify as critical, even if they technically result in direct fund movement. This definition is consistent with HackenProof’s Smart Contract Vulnerability Classification, and final decisions on severity will be made in collaboration with the project team.

We encourage researchers to submit all impactful findings, but only those meeting the strict “substantial fund theft” threshold will trigger the bonus payout.

🧮 Reward Splitting for Duplicate Findings If the same issue is reported by multiple researchers, the reward will be split using the following formula:

Final Reward = Severity Weight × (0.9 ^ (N - 1)) / N

Where:

  • Severity Weight =

    • Low → 20
    • Medium → 30
    • High → 50
  • N = number of researchers who submitted the same valid issue

  • Rewards are normalized against the total contest allocation and severity budget

Example (for a High severity issue with a weight of 50):

  • 1 researcher reports → receives 50 points
  • 2 researchers report → each receives ≈ 22.5 points
  • 3 researchers report → each receives ≈ 15 points

🧠 This system encourages early discovery and rewards uniqueness while ensuring all valid reporters are fairly acknowledged.

Duration
Start date18 Jun 2025
End date13 Aug 2025
Rewards
Range of bounty$45,000 - $85,000
Severity
Critical
$40,000
High
$0 - $45,000
Medium
$0 - $45,000
Low
$0 - $45,000
Stats
Scope Review7094
Submissions0
Total rewards$0
Types
smart contract
Languages
Move
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time30d
Reward Time40d
Resolution Time30d