Bug bounty
Triaged by Hackenproof
Hidden Gem

Zest Protocol Smart Contracts: Program info

Zest Protocol Smart Contracts

Company: Zest Protocol
POC required
This program is active now
Program infoHackers (5)Reports

Zest Protocol is a Bitcoin lending protocol. Zest Protocol operates on-chain and is open-source. Zest Protocol exists to make Bitcoin productive. All of it. The protocol strives to create a vibrant borrowing and lending ecosystem around BTC the asset. For more information about Zest Protocol, please visit https://www.zestprotocol.com/. Zest Protocol provides rewards in USDC/T on Ethereum, denominated in USD. For more details about the payment process, please view the Rewards by Threat Level section further below.

In scope
TargetTypeSeverityReward
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zststx-v2-0
copy
Copy
success Copied

zststx-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zaeusdc-v2-0
copy
Copy
success Copied

zaeusdc-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zsusdt-v2-0
copy
Copy
success Copied

zsusdt-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zdiko-v2-0
copy
Copy
success Copied

zdiko-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zusda-v2-0
copy
Copy
success Copied

zusda-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zusdh-v2-0
copy
Copy
success Copied

zusdh-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zwstx-v2-0
copy
Copy
success Copied

zwstx-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zststxbtc-v2-0
copy
Copy
success Copied

zststxbtc-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zsbtc-v2-0
copy
Copy
success Copied

zsbtc-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-borrow-v2-0-2
copy
Copy
success Copied

pool-borrow-v2-0-2

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.liquidation-manager-v2-0-2
copy
Copy
success Copied

liquidation-manager-v2-0-2

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-0-reserve
copy
Copy
success Copied

pool-0-reserve

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-0-reserve-v2-0
copy
Copy
success Copied

pool-0-reserve-v2-0

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.borrow-helper-v2-0-5
copy
Copy
success Copied

borrow-helper-v2-0-5

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-vault
copy
Copy
success Copied

pool-vault

Smart Contract
Critical
Bounty
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.math-v2-0
copy
Copy
success Copied

math-v2-0

Smart Contract
Critical
Bounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zststx-v2-0
copy
Copy
success Copied

zststx-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zaeusdc-v2-0
copy
Copy
success Copied

zaeusdc-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zsusdt-v2-0
copy
Copy
success Copied

zsusdt-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zdiko-v2-0
copy
Copy
success Copied

zdiko-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zusda-v2-0
copy
Copy
success Copied

zusda-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zusdh-v2-0
copy
Copy
success Copied

zusdh-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zwstx-v2-0
copy
Copy
success Copied

zwstx-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zststxbtc-v2-0
copy
Copy
success Copied

zststxbtc-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.zsbtc-v2-0
copy
Copy
success Copied

zsbtc-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-borrow-v2-0-2
copy
Copy
success Copied

pool-borrow-v2-0-2

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.liquidation-manager-v2-0-2
copy
Copy
success Copied

liquidation-manager-v2-0-2

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-0-reserve
copy
Copy
success Copied

pool-0-reserve

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-0-reserve-v2-0
copy
Copy
success Copied

pool-0-reserve-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.borrow-helper-v2-0-5
copy
Copy
success Copied

borrow-helper-v2-0-5

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.pool-vault
copy
Copy
success Copied

pool-vault

TypeSmart Contract
Severity
Critical
RewardBounty
Target
https://explorer.hiro.so/txid/SP2VCQJGH7PHP2DJK7Z0V48AGBHQAW3R3ZW1QF4N.math-v2-0
copy
Copy
success Copied

math-v2-0

TypeSmart Contract
Severity
Critical
RewardBounty

Focus Area

Documentation

  • Program Documentation — https://docs.zestprotocol.com/start
  • Program Codebase — https://github.com/Zest-Protocol/zest-contracts/tree/main/onchain/contracts/borrow

IN SCOPE: SMART CONTRACT VULNERABILITIES

Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.

  • Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield (Critical Impact)
  • Permanent freezing of funds (Critical Impact)
  • Protocol insolvency (Critical Impact)
  • Theft of unclaimed yield (High Impact)
  • Theft of unclaimed royalties (High Impact)
  • Permanent freezing of unclaimed yield (High Impact)
  • Permanent freezing of unclaimed royalties (High Impact)
  • Temporary freezing of funds (High Impact)

OUT OF SCOPE: SMART CONTRACT VULNERABILITIES

  • Lines of code that are not in the transfer-to-user function in pool-0-reserve: https://github.com/Zest-Protocol/zest-contracts/blob/main/onchain/contracts/borrow/production/vaults/pool-0-reserve.clar
  • Scenarios where the function get-base-supply-rate returns a value that is not u0 here: https://github.com/Zest-Protocol/zest-contracts/blob/main/onchain/contracts/borrow/production/vaults/pool-0-reserve-v2-0.clar

All Categories:

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (governance, strategist) except in such cases where the contracts are intended to have no privileged access to functions that make the attack possible
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program

Smart Contract Specific:

  • Incorrect data supplied by third party oracles
  • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

Program Rules

  • Avoid using web application scanners for automatic vulnerability searching which generates massive traffic
  • Make every effort not to damage or restrict the availability of products, services, or infrastructure
  • Avoid compromising any personal data, interruption, or degradation of any service
  • Don’t access or modify other user data, localize all tests to your accounts
  • Perform testing only within the scope
  • Don’t exploit any DoS/DDoS vulnerabilities, social engineering attacks, or spam
  • Don’t spam forms or account creation flows using automated scanners
  • In case you find chain vulnerabilities we’ll pay only for vulnerability with the highest severity.
  • Don’t break any law and stay in the defined scope
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission
  • Zest Protocol’s codebase can be found at https://github.com/Zest-Protocol/zest-contracts/tree/main/onchain/contracts/borrow . Documentation and further resources can be found on https://docs.zestprotocol.com/start/.

Disclosure Guidelines

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed for the moment.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability
  • Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through hackenproof.com
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • You must not be a former or current employee of us or one of its contractor.
  • ONLY USE the EMAIL under which you registered your HackenProof account (in case of violation, no bounty can be awarded)
  • Provide detailed but to-the point reproduction steps

Prohibited Activities:

  • Any testing on mainnet or public testnet deployed code; all testing should be done on local-forks of either public testnet or mainnet
  • Any testing with pricing oracles or third-party smart contracts
  • Attempting phishing or other social engineering attacks against our employees and/or customers
  • Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
  • Any denial of service attacks that are executed against project assets
  • Automated testing of services that generates significant amounts of traffic
  • Public disclosure of an unpatched vulnerability in an embargoed bounty
Rewards
Range of bounty$1,000 - $100,000
Severity
Critical
$20,000 - $100,000
High
$1,000 - $20,000
Medium
$0
Low
$0
Stats
Scope Review23767
Submissions8
Total rewards$0
Types
smart contract
Languages
Clarity
Project types
Lending
Hackers (5) View all
Patricia
1
Jonathan Ho
2
dede rosal
3
Saurabh Sankhwar
4
emirhan erdogu
5
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time3d
Reward Time3d
Resolution Time14d