Identifying technical vulnerabilities
Announcement: here;
This bounty brief describes the rules of KuChain Betanet Bug Bounty Program, as well as the eligibility of vulnerabilities and the rewards.
👉 Program duration: UTC+8 2020.07.01 10:00am - 2020.08.07 10:00am.
Vulnerabilities submitted before UTC+8 2020.07.01 10:00am and after UTC+8 2020.08.07 10:00am will be considered invalid.
Please upload your vulnerability report in KuChain GitHub repository - Project Deluge(Issues).
👉 According to the vulnerability severity, each effective bug report will be paid $ 200 – $ 10,000. Vulnerabilities with extreme impact may receive a reward of up to
We are eager to work with the community to make sure that everyone's finding is rewarded fairly - based on the vulnerability's impact on business and overall severity.
Rewards will be paid out in KCS.
When your submission is verified as a valid and rewarded vulnerability, please provide us with an ERC-20 address to receive your reward. You may register a KuCoin account here.
*Prices will change with the cryptocurrency markets and the dollar amount listed below could change.
Please note that only vulnerabilities with a working proof of concept that shows how it can be exploited will be considered eligible for monetary rewards.
Impact | Likelihood | Severity |
---|---|---|
High | High | Critical |
High | Medium | Severe |
High | Low | Moderate |
Medium | High | Severe |
Medium | Medium | Moderate |
Medium | Low | Low |
Low | High | Moderate |
Low | Medium | Low |
Likelihood: Likelihood represents the possibility that a particular vulnerability is discovered and exploited.
Impact: Impact measures the loss caused by an attack using this vulnerability.
Severity: Severity indicates the magnitude of the vulnerability.
Likelihood and impact are divided into three levels: high, medium and low.
Severity is decided by likelihood and impact with four levels: critical, severe, moderate and low.
Technical severity | Reward range |
---|---|
P1 - Critical | $ 3,500 or above |
P2 - Severe | $ 1,200 - $ 3,500 |
P3 - Moderate | $ 600 - $ 1,200 |
P4 - Low | $ 200 - $ 600 |
ℹ️KuChain API Documentation : here
ℹ️KuChain Betanet Faucet : here
ℹ️KuChain Block Explorer: here
ℹ️Draft White Paper (to be released by phases) :here
ℹ️ https://github.com/KuChainNetwork/kratos
Vulnerabilities that could undermine the fund safety of any user or business runner, including:
-
Vulnerabilities that could undermine the safety of any user or validator's fund/fee.
-
Vulnerabilities that could severely undermine trading or token economy.
-
Remote Code Execution on any Chain node, such as Validator nodes, Witness nodes, or Seed nodes.
-
Vulnerabilities related to key generation, encryption, decryption, signing and verification.
-
Vulnerabilities that could disrupt the Chain governance.
-
Transaction origin spoofing or transaction malleability.
Vulnerabilities with similar impact as P1 vulnerabilities, but are dependent on specific prerequisites, including:
-
Denial of service of any Chain validator node.
-
Vulnerabilities that could undermine or disrupt trading or token economy.
-
Vulnerabilities that could disrupt the Validator consensus result and performance.
-
Vulnerabilities that could cause the node to be unable to respond with transactions and balances.
Denial of service of critical functions, including:
- Denial of service of nodes.
Denial of service of non-critical functions, including:
- Vulnerabilities that could affect the stability or availability of Chain / Explorer.
- Issues that have no security impact. Including but not limited to:
- Web garbled.
- Failure to load a web page.
- Some functions cannot be used.
- Vulnerabilities that are not exploitable. Including but not limited to:
- Reports from automated tools or scans which are meaningless (e.g. the lower version of Web Server).
- Self-XSS.
- JSON Hijacking without sensitive information.
- CSRF with negligible security impact (e.g. adding to favorites, modifying ordinary personal data which is unrelated to important business).
- Exposure of internal IP address or domains.
- 401 basic certified fishing.
- Program path trust issues.
- Logcat information disclosure without sensitive information.
- Speculation without any evidence. Including but not limited to:
- Theoretical vulnerabilities.
- Use of known vulnerable libraries without actual proof of concept.
- Phishing (E.g. HTTP Basic Authentication Phishing).
- Internally known issues, duplicate issues, or issues which have already been made public.
👉 Participants maliciously attack or instigate others to maliciously attack KuChain as part of the Bug Bounty Program will be disqualified. Participants found to jeopardize the security of any private data and asset of KuChain users and/or to steal such information will be pursued according to the relevant legal responsibility.
Given that vulnerabilities in P1 level may affect the progress of Bug Bounty Program itself, we will not publicize P1 level vulnerabilities until their repairation.
While vulnerabilities in P2 to P4 level without substantial detriment to the event, we will inform you in the comment area under each bug submission as soon as we confirm its effectiveness.
Below is the detail review process of your bug report.
- Submit your vulnerability report on GitHub;
- Preliminary examination. For vulnerability report deemed to be invalid, its particular bulletin board will be closed after fair and transparent reasoning of the disqualification cause being given by KuChain team in the comment area (e.g. out of scope, incorrect report format, duplicates). Valid and identifiable vulnerability reports will be qualified for the next round of review; while for valid but not identifiable ones, KuChain team will reach out to the submitters via email to make sure we get the chance to fix every single vulnerability.
- Vulnerability confirmed in Step 2 will be graded by KuChain jury. We will inform the submitter with the vulnerability level in the comment area under the corresponding bug report right after the vulnerability level is determined.
- A week after the end of Bug Bounty Program, an official announcement on GitHub will be publicized, citing all valid and rewarded bug reports, including their submitters, vulnerability level and the corresponding rewards. Such information will also be communicated to the submitters by email.
- In the event of any objection concerning the jury’s decision, a one-week appeal period is set after the announcement where each bug submitter has one appeal opportunity.
- Rewards will be paid out in KCS to an ERC-20 address of qualified submitters one week after the appeal period.
- KuChain may be reset and dropped due to some vulnerabilities' repairation during the program. Vulnerabilities found in these cases will be considered invalid.
- Vulnerabilities which have already known by Cosmos-SDK will be considered invalid.