Bug bounty
Triaged by Hackenproof

Aptos Naming Service (ANS): Program info

Aptos Naming Service (ANS)

Company: Aptos Labs
KYC required
This program is active now
Program infoHackers (21)Reports

Aptos Naming Service ("Aptos Names") allows members of the Aptos ecosystem to purchase a digital asset that replaces one's blockchain address with a domain name of their choosing. We view this as the place where one's Aptos Identity begins.Aptos Labs ("Aptos", "we", or "us") welcomes feedback from security researchers and the general public to help improve the security of Aptos Names, and, at its sole discretion, offers bounty rewards ("Rewards") for security reports that identify previously unknown, in-scope security vulnerabilities

In scope
TargetTypeSeverityReward
https://github.com/aptos-labs/aptos-names-contracts/tree/main
copy
Copy
success Copied
Smart Contract
Critical
Bounty
https://www.aptosnames.com/
copy
Copy
success Copied
Web
Critical
Bounty
Target
https://github.com/aptos-labs/aptos-names-contracts/tree/main
copy
Copy
success Copied
TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://www.aptosnames.com/
copy
Copy
success Copied
TypeWeb
Severity
Critical
RewardBounty

Focus Area

Rewards are calculated based on the severity of the impact that the identified vulnerability would have on Aptos Names users and the Aptos Names service. The following severity classifications include sample impacts per criticality, and potential Reward ranges. Aptos Labs retains sole discretion to determine the severity classification of reported vulnerabilities and the amount of any Reward.

Smart Contracts

Critical - up to $250,000

  • Domain takeover

High - up to $50,000

  • Minting names without paying the cost
  • Changing where purchase payments go
  • Permanent blocking domain reading operations

Medium - up to $20,000

  • Blocking the creation of new domains or the transfer of existing ones

Backend Service

Critical - up to $50,000

  • Retrieving sensitive data from a running service
  • Forcing API to return an arbitrary address for a domain

If you identify a security vulnerability impacting Aptos Names that does not fall under any of the above categories, we encourage you to report it for further analysis and we will consider a Reward as appropriate. Security issues impacting Aptos Names having a root cause in external code dependencies are also in-scope for the program.

Program Rules

To be eligible for a Reward, you are required to:

  • Play by the rules, including following these Rules and any other relevant agreements. If there is any inconsistency or conflict between these Rules and any other applicable terms, the applicable terms of these Rules will prevail;
  • Submit an in-scope vulnerability as detailed above;
  • Include detailed information and clear steps to reproduce the issue. Vulnerabilities must be reproducible using the code currently in scope for the Program, based on the current mainnet deployment;
  • Avoid any testing on mainnet, testnet or devnet deployed code; all testing should be done locally;
  • Report any vulnerability within 24 hours of discovery;
  • Avoid disrupting our systems, destroying data, and/or harming users;
  • Only use this platform to report and discuss vulnerability information with us;
  • Provide us a reasonable amount of time to resolve the issue;
  • Limit the data you access to the minimum required to effectively demonstrate a Proof of Concept in circumstances where a vulnerability provides unintended access to private data or secrets;
  • Vulnerabilities based on social engineering (including Click Jacking) or network Denial of Service (DoS) attacks are considered out of scope and are not eligible for Rewards under this program;
  • Not engage in extortion.

Duplicate Reports

Rewards for duplicate reports will be split among reporters with first to report taking priority using the following equation:

R: total reports
ri: report priority
bi: bounty share

bi = 2 ^ (R - ri) / ((2^R) - 1)

Where report priority derives from the set of integers beginning at 1, where the first reporter has ri = 1, the second reporter ri = 2, and so forth.

Note, security reports that come in after the issue has been fully triaged and resolved will not be eligible for a Reward.

Disclosure Guidelines

Do not discuss or disclose any vulnerabilities, even resolved ones, outside of this Program without Aptos Labs’ written consent.

Eligibility and Coordinated Disclosure

You ARE NOT eligible to participate in the Program if you are:

  • A “Restricted Person” as defined in the Aptos Labs Terms of Use. To receive a Bounty, you will be required to complete an identity verification process to confirm that you are not a Restricted Person.
  • Under the age of 16. If you are at least 16 years old but are considered a minor in your place of residence, you must obtain your parent's or legal guardian's permission prior to participating in this Program.
  • Currently an employee or provide services to Aptos Labs or are a former employee or provided services to Aptos Labs within the last 12 months of your submitted security report.
  • Employed by an entity that does not allow you to participate in the Program.

To receive a Reward, you will have to enter into an Agreement with Aptos Labs and provide required information, which may include identity verification information and tax information or forms, such as a W-9 or W-8 for U.S. residents or citizens.

Rewards are managed by Aptos Labs and are denominated in United States Dollars (USD). Rewards may be paid partially or fully in digital assets at the sole discretion of Aptos Labs. If you receive digital assets as part of your Reward, the value of the digital assets in USD will be determined at the time you execute your Agreement with Aptos Labs and after you have satisfied all eligibility criteria. Token-based rewards may be subject to a lock-up period.

Getting Started

Rewards
Range of bounty$0 - $250,000
Severity
Critical
$0 - $250,000
High
$0 - $50,000
Medium
$0 - $20,000
Low
$0
Stats
Scope Review1630
Submissions24
Total rewards0
Types
Web
smart contract
Languages
Move
Hackers (21) View all
Hades
1
dglabz
2
Hunter Blevins
4
Mohamed
5
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time7d
Reward Time90d
Resolution Time14d