Audit
Triaged by Hackenproof

Mina SC DualDefense Audit: Program info

Mina SC DualDefense Audit

Company: Mina
KYC required POC required
Live
Contest is active now
Program infoHackers (4)Reports

Mina uses infinitely recursive zero knowledge proofs to create a 22KB blockchain for proving anything and enabling privacy-first applications.

In scope
TargetTypeSeverityReward
https://github.com/zksecurity/mina-attestations/tree/004f0fc8426efb30cb417c7a7ebdd00217dc459f
copy
Copy
success Copied
Smart Contract
Critical
Bounty
https://github.com/zksecurity/pallad/tree/bad4c8c02f7111efa2946ba4d276fd966ae2a414
copy
Copy
success Copied
Smart Contract
Critical
Bounty
Target
https://github.com/zksecurity/mina-attestations/tree/004f0fc8426efb30cb417c7a7ebdd00217dc459f
copy
Copy
success Copied
TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://github.com/zksecurity/pallad/tree/bad4c8c02f7111efa2946ba4d276fd966ae2a414
copy
Copy
success Copied
TypeSmart Contract
Severity
Critical
RewardBounty
Out of scope
TargetTypeSeverityReward
https://github.com/zksecurity/mina-attestations/commits/main/?since=2025-01-29&until=2025-05-21
copy
Copy
success Copied
Smart Contract
None
Bounty
Target
https://github.com/zksecurity/mina-attestations/commits/main/?since=2025-01-29&until=2025-05-21
copy
Copy
success Copied
TypeSmart Contract
Severity
None
RewardBounty

Focus Area

IN-SCOPE: SMART CONTRACT VULNERABILITIES

We are looking for evidence and reasons for incorrect behavior of the smart contract, which could cause unintended functionality:

  • Stealing or loss of end-user funds
  • Permanent lock of end-user funds

Program Rules

Only critical vulnerabilities that could lead to the loss of user funds or the permanent lock of funds are eligible for rewards.

  • The company is not obliged to pay for "Low"-"High" severity issues. Only "Critical" issues are under the scope. However, the team may, at its discretion, accept the report and pay the bonus, the reward will not be a part of the bounty pool.
  • Perform testing only within the scope
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission
  • Each vulnerability must have a fully working Proof of Concept (PoC) attached to the report at the time of submission. Submissions missing a valid POC will be closed and may result in a reputation point penalty.
  • Each vulnerability must have a significant, implicit high likelihood of exploitation.
  • Each vulnerability must include a suggested fix or mitigation strategy at the time of submission of the report
  • Human-based errors and rogue privileged users are considered to be not valid vulnerabilities or risks.

Fail to comply with these rules may result in the closure of your report, loss of reputation points, and ban from future participation in the contest

A critical vulnerability is defined as a vulnerability with both high likelihood and high impact.

High likelihood:

  • The attack can be executed without requiring privileged roles, although it may involve a mechanism that allows the attacker to gain control over a privileged entity and exploit that power if the vulnerability permits privilege escalation.
  • It does not require a significant token balance or substantial funding.
  • It does not demand considerable computational resources or extended time.
  • It has limited number of conditions that must occur.

High impact:

  • Direct theft of end-user funds.
  • Direct theft of protocol’s owner funds.
  • Permanent lockout of end-user funds.
  • Permanent lockout of protocol’s owner funds.
  • The amount of stolen or locked funds must exceed 2% of protocol’s TVL.
  • The amount of stolen or locked funds must exceed 1% of user’s deposit.

Reward Distribution:

  • The reward will be distributed in HAI tokens. For that you will need to provide in your account your hAI wallet address so we can arrange the transaction.

Clear wording:

  • Bounty pool — total amount of reward in the DualDefence Audit.
  • Allocated bounty — amount of reward for each unique vulnerability reported.
  • The total bounty pool for the DualDefence Audit will be equally split among all unique issues reported.
  • Example: If three researchers identify the same vulnerability and also there are two other vulnerabilities submitted only once (total 3 unique issues reported) each vulnerability will get 1/3 of the bounty pool. Allocated bounty reward will be split between all researchers who submitted the same issue (where uniq issues receive 1/3 of the pool and researchers will get 1/9 each of the initial reward pool).

Allocated bounty reward will be split between all researchers who submitted the same issue (where uniq issues receive 1/3 of the pool and researchers will get 1/9 each of the initial reward pool).

Single Valid Submission

Full Reward: If a critical vulnerability is found by only one participant, that reporter receives 100% of the bounty pool.

Duplicate Submissions

If multiple participants find the same vulnerability, the allocated bounty for that issue (bounty pool always equally split among all unique issues reported) is divided equally among all reporters. Example: If two researchers report the same vulnerability, each receives 50% of the allocated bounty. It can be 50% of the bounty pool if only one eligible issue was reported.

Multiple Unique Submissions

Split Based on Uniqueness of issues reported:

  • Unique Issue 1: Found by one reporter.
  • Unique Issue 2: Found by another reporter.

Each will receive 50% of the bounty pool.

[DISCLAIMER] The reward amount will be denominated in HAI tokens which are staked in FlashPool, due to market volatility, the final USD amount may differ from the one stated in the rules.

HackenProof is entitled to 10% of rewards as the fee for the triage and other services‼️

Disclosure Guidelines

Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization

  • No vulnerability disclosure, including partial is allowed till the end of FlashBounty Audit contest.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve our security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • The vulnerability must be a qualifying vulnerability.
  • Any vulnerability found must be reported exclusively through hackenproof.com.
  • You must provide a clear textual description of the issue along with detailed reproduction steps, including screenshots or proof-of-concept code as necessary.
  • You must not be a current or former employee, or contractor, of our organization.
  • Reports must be concise, relevant, and easy to reproduce.
  • Findings must be applicable to the protocol as currently deployed. Hypothetical issues based on alternative or future deployments (e.g., on different chains or configurations) are out of scope.

Last audit

Hacken - April 2025

Assets in Scope


src/ excluding the test files *.test.ts

spec/ for reference

apps/extension/

Credentials - Credentials Cryptographic Operations - Cryptographic Operations Documentation - Documentation Dynamic Types - Dynamic Types Presentation - Presentation Program & Specifications - Program & Specifications Serialization - Serialization Wallet - Wallet

Duration
Start date27 May 2025
End date24 Jun 2025
Rewards
Range of bounty$0 - $24,500
Severity
Critical
$24,500
High
$0
Medium
$0
Low
$0
Stats
Scope Review1479
Submissions6
Total rewards$0
Types
smart contract
Languages
Typescript
Project types
Wallet
Other
Hackers (4) View all
Priya Dharshan
2
Trung Thanh Luu
3
Ionut Valentin Baltag
4
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response0d
Triage Time0d
Reward Time30d
Resolution Time30d