This bug bounty program is focused on Web in Cronos which will directly lead to loss of user funds, or breach of sensitive data, or deletion of site data.
Target | Type | Severity | Reward |
---|---|---|---|
https://vvs.finance/ Copy Copied Web/App | Web | Critical | Bounty |
https://tectonic.finance Copy Copied Web/App | Web | Critical | Bounty |
https://veno.finance Copy Copied Web/App | Web | Critical | Bounty |
https://fulcrom.finance Copy Copied Web/App | Web | Critical | Bounty |
https://orby.network Copy Copied Web/App | Web | Critical | Bounty |
https://ferroprotocol.com Copy Copied Web/App | Web | Critical | Bounty |
https://minted.network/ Copy Copied Web/App | Web | Critical | Bounty |
https://cronosid.xyz/ Copy Copied Web/App | Web | Critical | Bounty |
https://amply.finance Copy Copied Web/App | Web | Critical | Bounty |
https://h2.finance Copy Copied Web/App | Web | Critical | Bounty |
Web/App
Web/App
Web/App
Web/App
Web/App
Web/App
Web/App
Web/App
Web/App
Web/App
Only the latest release version deployed to mainnet is considered as in-scope of the bug bounty program. Please note the following are out of scope: All folders and files labeled as “Mock” or “Test”
Impacts in scope
All web vulnerabilities are covered here:
The following vulnerabilities are excluded from the rewards for this bug bounty program:
Websites and Apps
We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:
All bug reports must come with a Proof-of-Concept (PoC) in order to be considered for a reward. For web/app bug reports, if the Report does not include a valid (PoC), the qualification of rewards will be decided according to reproducibility and severity of the vulnerability, and the rewards amount may be reduced significantly. The specific amount of the bounty will vary according to:
Critical smart contract vulnerabilities are capped at 10% of economic damage, primarily focused on the funds at risk, but also taking into account branding and PR considerations, at the discretion of the team.
All vulnerabilities that directly affect the smart contract, and app that directly cause unintentional withdrawals, draining of funds, or loss of user funds, are prioritized. Meaning, the team may choose to apply a temporary fix to the bug (or pause the contract) before resolving the bug report. This to ensure that the affected funds are safe while the team analyse the bug report, and NOT a confirmation of the bug report’s validity.
The only web vulnerabilities in scope are those which will directly lead to loss of user funds, or breach of sensitive data, or deletion of site data. For web vulnerabilities, the Cronos team will use CVSS calculator to figure out the severity and based on that they will determine the reward for the bounty.
Cronos team requires KYC to be done for all bug bounty hunters submitting a report and wanting a reward. Once the report is deemed valid, you will need to fill up the KYC form here. The collection of this information will be done by the Cronos team.
Payouts are handled by Cronos team and are denominated in USD. Payouts are done in USDC and USDT only, with the choice of the ratio at the discretion of the Cronos team.
Low (0.1 - 3.9) 100 - 300 Medium (4.0 - 6.9) 300 - 600 High (7.0 - 8.9) 600 - 1500 Critical (9.0 - 10.0) 1500 - 2500
Cronos team reserves the ultimate decision and will determine at its discretion whether a vulnerability is eligible for a reward and the amount of the award depending on severity.