aave / bug-bounty

23 stars 8 forks source link

Bug Bounty

Deprecation Warning: This Repo is no longer the bounty program. Please submit a bug through our community driven bug bounty program on Immunefi.

Overview

The security of Aave V3 users is paramount. For that reasons, starting on March 16, 2022, the Aave Protocol V3 (”Aave V3”) core repository is subject to the Aave Protocol V3 Bug Bounty (the “Program”). The Program enables community members to submit reports of “bugs” or vulnerabilities for a chance to earn rewards. The Program aims to incentivise responsible disclosure and enhance the security of Aave V3.

Rewards will be allocated based on the severity of the bug disclosed and evaluated and rewarded up to USD $250,000.

The scope, terms and rewards at the sole discretion of the team (the “Team”).

Scope

The Program includes the vulnerabilities and bugs in the Aave Protocol v3 core repository (located in the GitHub repositories, primarily at: aave/aave-v3-core).

The following are not within the scope of the Program:

Determinations of eligibility, score and all terms related to rewards and their payment are at the sole discretion of the Team.

Eligibility

To be eligible for a reward under this Program, you must:

Disclosure

Any vulnerability or bug discovered must be reported to the Team via security@aave.com. The disclosure must be made within 24 hours following the discovery of the vulnerability and, as noted above, not have been exploited in any way prior to disclosure or publicized or disclosed to any third party (other than the Team) prior to not only submission of the report, but also fixing of the bug / vulnerability.

It is mandatory to read and follow the responsible disclosure policy available in the references. Submissions not following the disclosure policy will not be eligible for a reward.

Rewards

All submissions are evaluated by the Team on a case by case basis. Rewards are allocated based on the severity of the issue, and other variables, including, but not limited to a) the quality of the issue description, b) the instructions for reproducibility, and c) the quality of the fix (if included). A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount. Therefore, please provide as much information about the vulnerability as possible.

The Program intends to follow a similar approach as the Ethereum Bug Bounty, where the severity of the issues will be based according to the OWASP risk rating model based on “Impact” and “Likelihood”. The evaluation on scoring is however at the sole discretion of the Team.

All rewards are paid in USDC via a transfer to the wallet address provided by the participant to the Team. The reward can’t be exhanged into other crypto assets or fiat. As a condition of participating in this Program, the participants give Company the permission to share their wallet address and other information provided by them to third parties for the purpose of administering this Program and complying with applicable laws, regulations, and rules.

The reward will be received in USDC token based on the following severity scheme:

Note = Up to 100 USDC

Very low = Up to 500 USDC

Low = Up to 1,000 USDC

Medium = Up to 5,000 USDC

High = Up to 10,000 USDC

Very High = Up to 50,000 USDC

Critical = Up to 250,000 USDC

Bug Bounty

Other terms

The decisions made regarding rewards are final and binding.

By submitting your report, you grant the Company any and all rights, including without limitation intellectual property rights, needed to validate, mitigate, and disclose the vulnerability. All reward decisions, including eligibility for and amounts of the rewards and how such rewards will be paid, are made at sole discretion of the Company.

Terms and conditions of the Program may be altered at any time. Company may change or cancel this Program at any time, for any reason.