Layer3 protocols and products are critical omnichain infrastructure for distribution, identity, and incentives. To date, Layer3 infrastructure has facilitated 120MM transactions throughout 500+ ecosystems across millions of users around the globe.
Target | Type | Severity | Reward |
---|---|---|---|
https://etherscan.io/address/0x8e02d37b6cad86039bdd11095b8c879b907f7d10#code Copy Staking (Proxy)
| Smart Contract | Critical | Bounty |
Staking (Proxy)
While we've outlined specific 'In Scope' and 'Out of Scope' areas, if you discover a vulnerability that doesn't clearly fit into these categories, we encourage you to submit it following the Program Rules. Your submission will be carefully reviewed and triaged accordingly.
We are looking for evidence and reasons for incorrect behavior of the smart contract, which could cause unintended functionality:
We are excluding issues that do not directly impact the intended functionality of the smart contract or do not demonstrate a practical, real-world vulnerability. This includes theoretical concerns, issues related to non-critical aspects of the contract, or vulnerabilities in external dependencies that fall outside our direct control.
Please be aware that the Layer3 team actively monitors and addresses vulnerabilities across all assets internally and across platforms. If you report an issue that is already known to us, it will be marked as a duplicate and closed. We kindly ask for your understanding in respecting our final decision and refraining from further negotiations once a decision has been made.
Submission Guidelines:
Testing Guidelines:
Prohibited Activities:
Vulnerability Handling:
Confidentiality:
Bounty Payments:
Legal Compliance:
We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward: