BOOK THIS SPACE FOR AD
ARTICLE ADCamino Network, in collaboration with Hexens.io, is excited to announce the relaunch of its Bug Bounty program on XYZ Remedy. This initiative offers a unique opportunity for independent security researchers to contribute to the enhancement of both Web 2.0 and Web 3.0 systems while earning rewards.
Camino operates as a blockchain platform within the travel industry, utilizing the Camino token to fuel its operations. It provides a flexible network that supports the enhancement of existing business models and the development of innovative tourist products, aimed at satisfying both travelers and business collaborators.
Hexens is a cybersecurity firm that prioritizes blockchain and emerging technologies in its services.
What’s the targeted audience?
The target audience for this bug bounty program primarily includes independent security researchers, cybersecurity enthusiasts, and experts with a keen interest in identifying vulnerabilities within smart contracts and contributing to the improvement of web security in the travel industry.
The focus of Camino Network’s bug bounty program lies on the following three protocols:
Protocol - https://github.com/chain4travel/caminogoProtocol (VM) - https://github.com/chain4travel/caminoethvmProtocol (CaminoJS) - https://github.com/chain4travel/camino-nodeIncluded in the examination are vulnerabilities related to smart contracts. Camino is specifically seeking out any signs that the contract isn’t behaving as intended, which could lead to unexpected results such as:
Funds being stolen or lostTransactions occurring without proper authorizationManipulation of transaction processesInstances where the code’s behavior deviates from the intended business planSituations involving reentrancy, where a function calls itself during executionReordering of operations within the contractCases where there’s an overflow or underflow of numerical values.Excluded from consideration are vulnerabilities in smart contracts that fall outside the following parameters:
Theoretical vulnerabilities lacking proof or demonstrationUsage of outdated compiler versionsFailure to lock the compiler versionVulnerabilities present in imported contractsViolations of code style guidesPresence of redundant codeGas optimization concernsIssues related to best practicesBugs already reported by Avalanche and documented in official release notes.What’s in it for you?
Check the juicy reward tiers below.
Critical: $15,000 — $20,000
Network failure preventing confirmation of new transactions (Total network shutdown requiring hard fork)Unintended permanent chain split requiring hard fork (Network partition requiring hard fork)Direct loss of fundsPermanent freezing of funds (fix requires hard fork)High: $5,000 — $15,000
Transient consensus failuresUnintended chain split (Network partition)Medium: $2,500 — $5,000
Denial-of-Service (DoS) attacks that do not shut down the networkLow: $50 — $2,500
Informational: Rewards up to $50