Crescendo
赏金计划
Help Secure the Biggest Flow Upgrade Since Launch
What is in the scope of this bounty program?
This bug bounty program seeks exploitable weaknesses in smart contract code, transactions, or scripts that could destabilize the Flow network, such as crashing or significantly slowing down network nodes.
The goal is to safeguard the Cadence and EVM runtime environment from unauthorized control and protect the non-public state of accounts from privilege escalation. Your expertise could earn substantial rewards and contribute to a more secure Flow network!
The bounty program welcomes any bug reports that clearly demonstrate unintended behavior and significantly impact Flow builders or users.
赏金等级
Where are potential bugs?
The Crescendo upgrade introduces major performance upgrades and full EVM equivalence. Here are the key areas that underwent significant changes, and potential bugs that could arise.
- New and updated functionality
- 对资源语义的规避,如未经授权的构建、复制或销毁后使用。
- 类型混淆,例如使用为某种类型(参数)设计的功能,而使用另一种类型的值。
Privilege elevation/bypassing sandbox protections for file system access controls, services/processes, and restricted memory access.
比如说。
- 通过对抗交易和/或智能合约,获得对托管 Cadence & EVM 运行环境的机器(如节点的私钥)的控制权。
- 访问托管 Cadence & EVM 运行时的节点的私钥。
- Gaining access to the Random Number Generator's internal state, leading to reliable prediction of future outcomes of on-chain randomness (see Flow’s VRF for more details).
- 在没有适当权限的情况下从信托基金保险库提款。
- 劫持其他用户的账户。
- 访问属于其他用户的私人数据。
- 不适当地获取敏感和/或私人信息,如一份合同获取另一份合同的私人字段。
- 未经授权更改应用程序或其数据。
- 绕过与账户变更有关的业务逻辑规则。
- 绕过授权和认证机制。
- Bugs or vulnerabilities in exposed API endpoints.
- 数据损坏或丢失。
- 由于数据迁移或事务/脚本执行导致无法访问数据。
What is outside the scope of this program?
All vulnerabilities must be reported in accordance with the Flow Responsible Disclosure Process.
For a list of Flow protocol and web application exclusions (i.e. non-qualifying vulnerabilities), refer to the Flow Responsible Disclosure.