The Ethereum Basis Bug Bounty Program is likely one of the earliest and longest working packages of its form. It was launched in 2015 and focused the Ethereum PoW mainnet and associated software program. In 2020, a second Bug Bounty Program for the brand new Proof-of-Stake Consensus Layer was launched, working alongside the unique Bug Bounty Program.
The cut up of those packages is historic because of the manner the Proof-of-Stake Consensus Layer was architected individually and in parallel to the prevailing Execution Layer (contained in the PoW chain). For the reason that launch of the Beacon Chain in December of 2020, the technical structure between the Execution Layer and the Consensus Layer has been distinct, aside from the deposit contract, so the 2 bug bounty packages have remained separated.
In mild of the approaching Merge, at present we’re joyful to announce that these two packages have been efficiently merged by the superior ethereum.org staff, and that the max bounty reward has been considerably elevated!
Merge (of the Bug Bounty Packages) ✨
Because the Execution Layer and Consensus Layer turn into increasingly more interconnected, it’s more and more precious to mix the safety efforts of those layers. There are already a number of efforts being organized by consumer groups and the group to additional enhance data and experience throughout the 2 layers. Unifying the Bounty Program will additional enhance visibility and coordination efforts on figuring out and mitigating vulnerabilities.
Elevated Rewards 💰
The max reward of the Bounty Program is now 500,000 throughout these durations!
In complete, this marks a 10x enhance from the earlier most payout on Consensus Layer bounties and a 20x enhance from the earlier max payout on Execution Layer bounties.
Impression Measurement 💥
The Bug Bounty Program is primarily targeted on securing the bottom layer of the Ethereum Community. With this in thoughts, the impression of a vulnerability is in direct correlation to the impression on the community as an entire.
Whereas, for instance, a Denial of Service vulnerability present in a consumer being utilized by <1% of the community will surely trigger points for the customers of this consumer, it could have a better impression on the Ethereum Community if the identical vulnerability existed in a consumer utilized by >30% of the community.
Along with the merge of the bounty packages and enhance of the max reward, a number of steps have been taken to make clear the right way to report vulnerabilities.
DNS Safety TXT
DNS Security TXT is applied and incorporates details about the right way to report vulnerabilities. This entry will be considered by working dig _security.ethereum.org TXT.
How will you get began? 🔨
With 9 completely different shoppers written in numerous languages, Solidity, the Specs, and the deposit sensible contract all throughout the scope of the bounty program, there’s a loads for bounty hunters to dig into.
If you happen to’re in search of some concepts of the place to start out your bug searching journey, check out the previously reported vulnerabilities. This was final up to date in March and incorporates all of the reported vulnerabilities we’ve on file, up till the Altair community improve.
We’re wanting ahead to your studies! 🐛