Meet Sui Wallet by Mysten Labs
At Mysten Labs, we are building critical infrastructure to enable a more decentralized internet.
Check Out The Rewards
If you find a vulnerability according to the bounty rules, Sui Wallet will reward you:
- Critical: $10,000 – $30,000
- High: $3,000
- Medium: $2,000
- Low: $1,000
Join The Bounty Hunt
There are Code and Web extension to scope!
Make sure your reports contain info about these incidents:
- The funds being frozen or locked within the wallet, and otherwise irrecoverable
- The funds being stolen by an attacker through leaking of the Secret Recovery Phrase or transactions specifically when visiting a webpage
- Entire set of accounts being irrecoverable using existing flows in the app.
Critical
- Execution of unauthorized system commands
- Retrieval of sensitive data/files from the server
- Performing state-altering authenticated actions on behalf of other users without their interaction, such as:
- Modifying user registration information
- Altering NFT metadata
- Seizing control of a subdomain through interaction with an already-connected wallet
- Direct unauthorized access or theft of user funds
- Malicious interactions with an already-connected wallet such as:
- Changing transaction arguments or parameters
- Substituting contract addresses
- Submitting malicious transactions
- Direct theft of user NFTs
- Injection of malicious HTML or XSS through NFT metadata
High
- Seizing control of a subdomain without interaction with an already-connected wallet.
- Injection or modification of static content on the target application without the use of JavaScript (Persistent), which could include:
- HTML injection devoid of JavaScript
- Substitution of existing text with arbitrary content
- Unrestricted file uploads, and more
- Alteration of sensitive user details (including modifications to browser local storage) without interaction with an already-connected wallet and requiring only a single user interaction, which could include:
- Changing a user’s email or password
- Incorrect disclosure of confidential user information such as:
- Email addresses
- Phone numbers
- Physical addresses
Medium
- Injecting/modifying the static content on the target application without
- Javascript (Reflected) such as:
- Reflected HTML injection
- Loading external site data
- Redirecting users to malicious websites (Open Redirect)
Low
- Taking over broken or expired outgoing links such as Social media handles, etc.
- Temporarily disabling user to access target site, such as:
- Locking up the victim from login
- Cookie bombing, etc
Once you’re ready, click here to join the bounty hunt!