The Ethereum Basis Bug Bounty Program is among the earliest and longest operating applications of its sort. It was launched in 2015 and focused the Ethereum PoW mainnet and associated software program. In 2020, a second Bug Bounty Program for the brand new Proof-of-Stake Consensus Layer was launched, operating alongside the unique Bug Bounty Program.
The cut up of those applications is historic because of the method the Proof-of-Stake Consensus Layer was architected individually and in parallel to the present Execution Layer (contained in the PoW chain). For the reason that launch of the Beacon Chain in December of 2020, the technical structure between the Execution Layer and the Consensus Layer has been distinct, aside from the deposit contract, so the 2 bug bounty applications have remained separated.
In mild of the approaching Merge, in the present day we’re completely satisfied to announce that these two applications have been efficiently merged by the superior ethereum.org group, and that the max bounty reward has been considerably elevated!
Merge (of the Bug Bounty Packages) ✨
With The Merge approaching, the 2 beforehand disparate bug bounty applications have been merged into one.
Because the Execution Layer and Consensus Layer develop into an increasing number of interconnected, it’s more and more priceless to mix the safety efforts of those layers. There are already a number of efforts being organized by consumer groups and the group to additional improve information and experience throughout the 2 layers. Unifying the Bounty Program will additional improve visibility and coordination efforts on figuring out and mitigating vulnerabilities.
Elevated Rewards 💰
The max reward of the Bounty Program is now 500,000 throughout these intervals!
In whole, this marks a 10x improve from the earlier most payout on Consensus Layer bounties and a 20x improve from the earlier max payout on Execution Layer bounties.
Influence Measurement 💥
The Bug Bounty Program is primarily centered on securing the bottom layer of the Ethereum Community. With this in thoughts, the influence of a vulnerability is in direct correlation to the influence on the community as an entire.
Whereas, for instance, a Denial of Service vulnerability present in a consumer being utilized by 30% of the community.
Visibility 👀
Along with the merge of the bounty applications and improve of the max reward, a number of steps have been taken to make clear how one can report vulnerabilities.
Github Safety
Repositories resembling ethereum/consensus-specs and ethereum/go-ethereum now comprise data on how one can report vulnerabilities in SECURITY.md information.
safety.txt
safety.txt is carried out and comprises details about how one can report vulnerabilities. The file itself will be discovered right here.
DNS Safety TXT
DNS Safety TXT is carried out and comprises details about how one can report vulnerabilities. This entry will be considered by operating dig _security.ethereum.org TXT.
How will you get began? 🔨
With 9 totally different shoppers written in numerous languages, Solidity, the Specs, and the deposit good contract all inside the scope of the bounty program, there’s a loads for bounty hunters to dig into.
In case you’re in search of some concepts of the place to start out your bug searching journey, check out the beforehand reported vulnerabilities. This was final up to date in March and comprises all of the reported vulnerabilities now we have on document, up till the Altair community improve.
We’re trying ahead to your experiences! 🐛