Bug Bounty
Open reward pool for discovering and reporting vulnerabilities in the mStable protocol.
Last updated
Was this helpful?
Open reward pool for discovering and reporting vulnerabilities in the mStable protocol.
Last updated
Was this helpful?
Our awesome friends over at Immunefi.com are the best place to see a quick breakdown of mStable's bug bounty. Check it out .
An ongoing bug bounty for the smart contracts of the mStable protocol is now live. mStable intends for hackers to look for smart contract vulnerabilities in our system that can lead to loss of collateral, unfair payouts or locked components. mStable must be as resilient as possible. Please submit a bug and earn a reward of up to US$25,000 **(or more in extreme circumstances).**
Submissions **must adhere to the .****
Rewards will be awarded at the sole discretion of the mStableDAO. The quality of the report and reproduction instructions can impact the reward. Rewards are denominated mUSD and will be paid out in mUSD.
The bug bounty program is ongoing and has been running since June 05th, 2020.
NB: Payout amounts increased (max 25k) as of July 14th, 2020.
The reward will be based on the following severity scheme, based on the methodology:
Any front-end applications or client-side code interacting with the contracts, as well as testing code
Mismatch of the functionality of the contracts and outdated spec documents
Loss of collateral or stealing of funds from the mAsset, resulting in it becoming under-collateralised (related: contracts/masset/*/*
)
Unfair payouts through SAVE, MINT, REDEEM or SWAP functionalities that results in under-collateralised or affected system (related: contracts/masset/**/*
, contracts/savings/*
)
Manipulating or circumvention of mStable governance mechanism (related: contracts/nexus/Nexus.sol
, contracts/governance/*
)
Locking or freezing or any of the mStable contracts or inability to upgrade (related: contracts/upgradability/*
)
Ineffective or error prone forge validation mechanisms (related: contracts/masset/forge-validator/*
)
Public disclosure of the vulnerability, before explicit consent from mStable to do so, will make the vulnerability ineligible for a bounty
Attempting to exploit the vulnerability in any public Ethereum network will also make it ineligible for a bounty
Only unknown vulnerabilities will be awarded a bounty; in case of duplicate reports, the first report will be awarded the bounty
If you want to add more information to a provided issue, create a new submission giving reference to the initial one
Rewards will be decided on a case by case basis and the bug bounty program, terms, and conditions are at the sole discretion of mStable
Any interference with the protocol, client or platform services, on purpose or not during the process will make the submission invalid
Terms and conditions of the bug bounty process may vary over time
While researching, we’d like to ask you to refrain from:
Denial of service
Spamming
Social engineering (including phishing) of mStable staff or contractors
In case you discover a vulnerability, we would like to know about it immediately so we can take steps to address it as quickly as possible.
If you discover a vulnerability, please do the following:
Do not take advantage of the vulnerability or problem you have discovered
Do not reveal the problem to others until it has been resolved
Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties;
Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Complex vulnerabilities may require further explanation so we might ask you for additional information
We promise the following:
We will respond to your report with a confirmation of receipt, followed by our evaluation of the report and an expected resolution date within 3 business days
We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission
If you so wish we will keep you informed of the progress towards resolving the problem;
In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise)
We offer a reward for every report of a security problem that was not yet known to us. The amount of the reward will be determined based on the severity of the leak, the quality of the report and any additional assistance you provide
Found a bug? Follow the to submit to the team at or directly to the mStable team.
The bug bounty is applicable to mStable's solidity contract suite, specifically any contracts residing in **on "master" branch (excluding the "z_mocks" sub-folder).
********
****
Submissions need to be related with the Bounty . Submissions out of the Bounty Scope won’t be eligible for a reward
It is mandatory to read and follow the available in the references. Submissions not following the disclosure policy will not be eligible for a reward
E-mail your findings to with the subject "Bug bounty"
If you have followed the , we will not take any legal action against you in regard to the report
Questions? Reach out to us on or via