If you comply with the policies below when reporting a security issue, we will not initiate a lawsuit or law enforcement investigation against you in response to your report. We ask that:
You must be at least 18 years old or have reached the age of majority in your jurisdiction of primary residence and citizenship to be eligible to receive any monetary compensation as a Researcher.
A citizen or resident of a country in which use or participation is prohibited by law, decree, regulation, treaty or administrative act;
A citizen or resident of, or located in, a country or region that is subject to U.S. or other sovereign country sanctions or embargoes;
An individual or an individual employed by or associated with an entity identified on the U.S. Department of Commerce’s Denied Persons or Entity List, the U.S. Department of Treasury’s Specially Designated Nationals or Blocked Persons Lists, or the Department of State’s Debarred Parties List or otherwise ineligible to receive items subject to U.S. export control laws and regulations, or other economic sanction rules of any sovereign nation.
Risk levels were divided incrementally as: Critical, Severe, Moderate, Low.
Bounty rewards were linked to these risk levels as follows:
Targets:
OPEN Chain
OPEN API
GitHub Repository
Non-targets:
Any property of OPEN not listed in the targets section is out of scope.
Critical
Severe
Moderate
Low
Level 1
250,000-500,000 OPEN
Level 2
100,000 - 250,000 OPEN
Level 3
25,000 - 100,000 OPEN
Level 4
1000 - 25,000 OPEN
Potential systematic flaws, including access to server, access to data, access to website administration, transaction manipulations etc.
Potential risks of leaks or manipulation of user accounts: private keys, user’s sensitive information and data etc.
Potential leaks of system’s sensitive information, source code etc.
Risks of having negative impact on transaction speed of main net or loss of crypto assets.
Risks of being unable to implement transactions.
Leaks of insensitive information of users that may not cause direct loss of assets.
Problems of user experience of OPEN main net.
Before making a report, please read the program rules above.
Include the information from the template into Bug Bounty Report.
Vulnerability Classifications
OPEN Chain logic subversion.
Wallet vulnerabilities which undermine security of user or validator funds.
Vulnerabilities surrounding wallet downloads, key generation, wallet recovery, and transaction signing.
Sybil Attacks on OPEN Chain.
DDoS Attacks on OPEN website.
Security threats surrounding OPEN Chain Explorer.
Scaffold deployment manipulation.
Template of Bug Bounty Report:
Ineligible Issues
Vulnerabilities without proper evidence
Property not belonging to OPEN
Vulnerability Submission
Format
Title of Vulnerability
Affected Asset
Description
Vulnerability impact (In relation to OWASP)
PoC
Solution
Once the issue has been created OPEN team will review the information and assign a severity level.
You will be asked to send proof of identity and get rewarded from the bug bounty wallet created for this program.
Email to bugbounty@openfuture.io (Encrypt via PGP)