Bringing selective transparency to Ethereum. Using zero-knowledge proofs, DOP allows you to decide what crypto assets and transactions you wish to make public.
Target | Type | Severity | Reward |
---|---|---|---|
https://etherscan.io/address/0x97A9a15168C22B3C137E6381037E1499C8ad0978 Copy Copied Token | Code | Critical | Bounty |
https://etherscan.io/address/0x9A3152b61420ed4D5e594c0b48bB932eE41B7376 Copy Copied Protocol | Code | Critical | Bounty |
https://etherscan.io/address/0x953be9C1ADb9c651bBEC52E614c06EEe7FF9AA27 Copy Copied Staking V1 | Code | Critical | Bounty |
Token
Protocol
Staking V1
Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.
PoC Required for payouts
The following are not within the scope of the Program:
To be eligible for a reward under this Program, you must:
Data Ownership Protocol adheres to the Primacy of Impact for the following severity levels:
If a category’s severity level is covered within the Primacy of Impact, it means that even if the impacted asset is not in-scope but is owned by the project, then it would be considered as in-scope of the bug bounty program as long as it involves an impact under that respective severity level. When submitting a report, just select the Primacy of Impact asset placeholder.
Rewards are distributed according to the impact of the vulnerability based on HackenProof Vulnerability Severity Classification System: https://docs.hackenproof.com/bug-bounty/vulnerability-classification/smart-contracts
Impact - Severity Direct theft of user or protocol funds other than unclaimed yield - Critical Protocol Insolvency - Critical Permanent freezing of funds - Critical Theft of unclaimed yield - High Permanent freezing of unclaimed yield - High Temporary freezing of funds - High Smart contract unable to operate due to lack of token funds - Medium Block stuffing for profit - Medium Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol) - Medium Theft of gas - Medium Contract fails to deliver promised returns, but doesn't lose value - Low
Critical smart contract vulnerabilities are further capped at 10% of economic damage, which primarily considers the funds at risk. In cases of repeatable attacks, only the first attack is considered unless the smart contract cannot be upgraded or paused.
High smart contract vulnerabilities are further capped at 10% of economic damage, which primarily considers the funds at risk. In cases of repeatable attacks, only the first attack is considered unless the smart contract cannot be upgraded or paused.
In cases of repeatable attacks for smart contract bugs, only the first attack will be counted, regardless of whether the smart contract is upgradable, pausable, or killable.
Security researchers who fall under any of the following are ineligible for a reward
Residents or citizens of OFAC restricted countries, as well as citizens or residents individually listed on the EU sanctions map Members of a household, related to or next of kin of a compensated core team members of the Data Ownership Ltd.
By submitting your report, you grant the Data Ownership Ltd any and all rights, including intellectual property rights, needed to validate, mitigate, and disclose the vulnerability. All reward decisions, including eligibility for and amounts of the rewards and the manner in which such rewards will be paid, are made at the sole discretion of the Data Ownership Ltd. The terms and conditions of the Data Ownership Protocol Bug Bounty Program may be altered at any time. The above scope, terms, and rewards of the program are at the sole discretion of the Data Ownership Ltd.