You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We value contributions from the community to strengthen the security of the core contracts. We want to reward any hackers in good faith who report vulnerabilities.
The scope of this bounty includes the PoolTogether smart contracts. The determination of the bug severity will be made by the PoolTogether team.
Payouts will be as follows:
High: $25,000 DAI
Medium: $10,000 DAI
Low: $1,000 DAI
The issue must:
be a previously unreported, non-public vulnerability.
include enough detail for us to identify and reproduce the problem
All reports should start with an email to [email protected] and they will receive a response within 24 hours. Non-security issues are not eligible for this bounty.
We value contributions from the community to strengthen the security of the core contracts. We want to reward any hackers in good faith who report vulnerabilities.
The scope of this bounty includes the PoolTogether smart contracts. The determination of the bug severity will be made by the PoolTogether team.
Payouts will be as follows:
High: $25,000 DAI
Medium: $10,000 DAI
Low: $1,000 DAI
The issue must:
All reports should start with an email to [email protected] and they will receive a response within 24 hours. Non-security issues are not eligible for this bounty.
We determine the severity of an issue according to the Smart Contract Security Alliance Severity Levels
Determinations of eligibility and all terms related to this award are at the sole and final discretion of the PoolTogether team.
The text was updated successfully, but these errors were encountered: