Swisstronik is an identity-based hybrid blockchain that lets Web 3.0 and traditional companies easily build compliant products thanks to on-chain KYC, AML & DPR solutions and blockchain privacy features.
This Bug Bounty is targeting dApp and Smart contract developers (Javascript, Typescript & Solidity).
These bugs can arise when interacting with the blockchain by deploying contracts or making transactions/calls, and problems related to the accuracy or clarity of the documentation.
Target | Type | Severity | Reward |
---|---|---|---|
https://link.swisstronik.com/nfj Copy Copied SWTR Token Faucet | Other | None | Bounty |
https://link.swisstronik.com/m2k Copy Copied Swisstronik-EVM Block Explorer | Other | Critical | Bounty |
https://link.swisstronik.com/04j Copy Copied Swisstronik-Cosmos Block Explorer | Other | None | Bounty |
https://link.swisstronik.com/zky Copy Copied Swisstronik Docs | Other | None | Bounty |
https://link.swisstronik.com/zs7 Copy Copied EVM JSON-RPC Link | Other | None | Bounty |
https://link.swisstronik.com/d0t Copy Copied EVM WebSocket Link | Other | None | Bounty |
SWTR Token Faucet
Swisstronik-EVM Block Explorer
Swisstronik-Cosmos Block Explorer
Swisstronik Docs
EVM JSON-RPC Link
EVM WebSocket Link
These bugs can arise when interacting with the blockchain by deploying contracts or making transactions/calls, and problems related to the accuracy or clarity of the documentation. Bugs on the blockchain that can disrupt operations, causing technical glitches, transaction errors, and data inaccuracies.
Some examples of these are(but not limited to):
We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:
The provision of KYC is required to receive a reward for this bug bounty program where the following information will be required to be provided: Email verification, photo/selfie, ID/Passport, country of residence & nationality
Restrictions on Security Researcher Eligibility:
Security researchers who fall under any of the following are ineligible for a reward.
Bug/Vulnerability Description Clearly state and describe the identified bug or vulnerability.
Hardware and Software Specifications OS Name & version CPU Name & Brand Go version Rust version SGX version (optional) Docker environment
Steps to Reproduce Provide clear and concise instructions to reproduce the reported bug or vulnerability.
Impact Analysis Analyze the potential consequences of the bug or vulnerability on users, developers, and the organization.
Code Fix Submission (Optional) If you have a suggestion for fixing the bug or vulnerability, provide a code fix or a proposed solution.
Additional Context (Optional)Share any relevant context, screenshots, logs, or error messages that can facilitate problem-solving and comprehensive understanding.
Submission Criteria Bug reports must adhere to the guidelines outlined in the Issue template to ensure effective resolution. (Note: This issue template has already been implemented in each repository under scope.)