Audit
Triaged by Hackenproof

Blackhan Software Audit Contest: Program info

Blackhan Software Audit Contest

Company: Blackhan Software
POC required
Live
Contest is active now
Program infoHackers (6)Reports

At Blackhan Software, we are dedicated to developing cutting-edge protocols within Web3 technology, and producing user-friendly applications that provide a seamless experience to our users.

In scope
TargetTypeSeverityReward
https://github.com/blackhan-software/xpower-banq/tree/5f734cc14fd05afcf7ee221de0bb600f8ca2339c
copy
Copy
success Copied
Smart Contract
Critical
Bounty
https://github.com/blackhan-software/xpower-fy/tree/674baa73ce7235af06d8559eaacbf6fcc0a94ab1
copy
Copy
success Copied
Smart Contract
Critical
Bounty
Target
https://github.com/blackhan-software/xpower-banq/tree/5f734cc14fd05afcf7ee221de0bb600f8ca2339c
copy
Copy
success Copied
TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://github.com/blackhan-software/xpower-fy/tree/674baa73ce7235af06d8559eaacbf6fcc0a94ab1
copy
Copy
success Copied
TypeSmart Contract
Severity
Critical
RewardBounty

Focus Area

IN SCOPE VULNERABILITIES

Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.

  • Any governance voting result manipulation
  • Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield
  • Permanent freezing of funds
  • Insolvency
  • Theft of unclaimed yield
  • Permanent freezing of unclaimed yield
  • Temporary freezing of funds
  • Smart contract unable to operate due to lack of funds
  • Block stuffing for profit
  • Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)
  • Theft of gas
  • Unbounded gas consumption
  • Smart contract fails to deliver promised returns, but doesn’t lose value
  • Functional correctness of implementation even if it's not directly impacting user funds.

OUT OF SCOPE

  • Incorrect data supplied by third party oracles
  • Not to exclude oracle manipulation/flash loan attacks
  • Basic economic governance attacks (e.g. 51% attack)
  • Lack of liquidity
  • Sybil attacks
  • Centralization risks

Program Rules

The following activities are prohibited by this contest event:

  • Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
  • Any testing with pricing oracles or third party smart contracts
  • Attempting phishing or other social engineering attacks against employees and/or customers
  • Any denial of service attacks
  • Public disclosure of an unpatched vulnerability in an embargoed bounty
  • Make every effort not to damage or restrict the availability of products, services, or infrastructure
  • Avoid compromising any personal data, interruption, or degradation of any service
  • Localize all tests to your accounts
  • Perform testing only within the scope
  • In case you find chain vulnerabilities we’ll pay only for vulnerability with the highest severity.
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of the Company without appropriate permission
  • Discussion

We use Discord as official communication channel: https://discord.gg/e8tpck3F Join the channel, and create #support ticket to be added for conversation.

Disclosure Guidelines

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed for the moment.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • The vulnerability must be a qualifying vulnerability
  • Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through hackenproof.com
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • You must not be a former or current employee of us or one of its contractor.
  • Provide detailed but to-the point reproduction steps

Rewards Distribution

Rewards Distribution

  • 40% for critical issues
  • 30% for high issues
  • 15% for medium issues
  • 5% gas optimization issues, best practices Read more: https://docs.hackenproof.com/
Duration
Start date09 May 2025
End date20 May 2025
Rewards
Range of bounty$0 - $10,000
Severity
Critical
$0 - $4,000
High
$0 - $3,000
Medium
$0 - $1,500
Low
$0 - $500
Stats
Scope Review644
Submissions10
Total rewards$0
Types
smart contract
Languages
Solidity
Hackers (6) View all
Mohamed kamal Farag
2
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response30d
Triage Time30d
Reward Time40d
Resolution Time30d