Bug bounty

Unistake Smart Contracts: Program info

Unistake Smart Contracts

Company: Unistake
This program left 1430 days ago
Program infoHackers (2)Reports

Unistake is a decentralized token protocol built to empower DeFi projects and incentivize liquidity providers.

In scope
TargetTypeSeverityReward
Multiplier
copy
Copy
success Copied

https://etherscan.io/address/0xbc962d7be33d8afb4a547936d8ce6b9a1034e9ee

Solidity
Critical
Bounty
PoolStake
copy
Copy
success Copied

https://etherscan.io/address/0x4ffb0e15dd08147cc64da9e73b24dc40b1a6c584

Solidity
Critical
Bounty
PoolStakeFactory
copy
Copy
success Copied

https://etherscan.io/address/0xd67fd2dfe741b15bd93df796b66868347e887ba2

Solidity
Critical
Bounty
Target
Multiplier
copy
Copy
success Copied

https://etherscan.io/address/0xbc962d7be33d8afb4a547936d8ce6b9a1034e9ee

TypeSolidity
Severity
Critical
RewardBounty
Target
PoolStake
copy
Copy
success Copied

https://etherscan.io/address/0x4ffb0e15dd08147cc64da9e73b24dc40b1a6c584

TypeSolidity
Severity
Critical
RewardBounty
Target
PoolStakeFactory
copy
Copy
success Copied

https://etherscan.io/address/0xd67fd2dfe741b15bd93df796b66868347e887ba2

TypeSolidity
Severity
Critical
RewardBounty

Focus Area

In Scope

We are looking for evidence and reasons for incorrect behavior of the smart contract, which could cause unintended functionality:

  • Stealing or loss of funds
  • Unauthorized transaction
  • Transaction manipulation
  • Attacks on logic (behavior of the code is different from the business description)
  • Reentrancy
  • Reordering
  • Over and underflows

Out of Scope

  • Theoretical vulnerabilities without any proof or demonstration
  • Old compiler version
  • The compiler version is not locked
  • Vulnerabilities in imported contracts
  • Code style guide violations
  • Redundant code
  • Gas optimizations
  • Best practice

Program Rules

  • Perform testing only within the scope
  • Test only on private testnet, no testing for third party contracts
  • Only vulnerabilities that can lead to real issues are covered by the bug bounty program
  • In special cases, the size of the award can be increased if the researchers demonstrate how the vulnerability can be used to inflict maximum harm
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission

Rewards

  • Critical 3,500 - 5,000 USDT
  • High 1200 - 1500 USDT
  • Medium 200 - 300 USDT
  • Low 100 USDT
Rewards
Range of bounty$100 - $5,000
Severity
Critical
$0
High
$0
Medium
$0
Low
$0
Stats
Scope Review72231
Submissions5
Total rewards0
Types
blockchain
smart contract
Hackers (2) View all
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response1d
Triage Time2d
Reward Time1d
Resolution Time2d