We are thrilled to announce the launch of our bug bounty program on Blast, in partnership with Immunefi, Web3’s leading bug bounty platform. Users and hackers can try out all the features currently available in Blast and submit any issues found through the Immunefy platform.
Building on our promise to Empower Web3 Development and to create a high-performing and secure ecosystem for Web3 builders and users, we have partnered with Immunefy to offer rewards to those who help us identify any potential issues on Blast. While our services and infrastructure are diligently tested and reviewed in-house, our partnership with Immunefy will strengthen our quality and security efforts and will help us build on our promise of reliability, paving the road for the release of Blast V2, which will be decentralized.
Bware Labs Bug Bounty powered by Immunefi
Through this partnership, Bware Labs plans to reward developers, hackers, and techies who find bugs and vulnerabilities in our API Infrastructure platform. The Immunefi bug bounty covers a number of features and assets, such as the UI performance and security of Blastapi.io. The severity of these issues is classified on a 4-level scale from “Low” to the highest level “Critical”. You can find more information and details in the updated Immunefi documentation: https://immunefi.com/severity-updated/. Rewards are distributed according to the impact of the bug, based on the Immunefi Vulnerability Severity Classification System V2.1
The following severity definitions are considered within the Blast bug bounty campaign scope:
Websites and Applications
CriticalExecute arbitrary system commandsRetrieve sensitive data/files from a running server such as /etc/shadow, database passwords, and blockchain keys(this does not include non-sensitive environment variables, open-source code, or usernames)Taking down the application/websiteTaking state-modifying authenticated actions (with or without blockchain state interaction) on behalf of other users without any interaction by that user, such as, changing registration information, commenting, voting, making trades, withdrawals, etc.Subdomain takeover with already-connected wallet interactionDirect theft of user fundsMalicious interactions with an already-connected wallet such as modifying transaction arguments or parameters, substituting contract addresses, submitting malicious transactions
LowChanging details of other users (including modifying browser local storage) without already-connected wallet interaction and with significant user interaction such as iframing leading to modifying the backend/browser state (must demonstrate impact with PoC)Any impact involving a publicly released CVE without a working PoCTaking over broken or expired outgoing links such as social media handles, etc.Temporarily disabling users to access target site, such as locking up the victim from login, cookie bombing, etc.
Out of Scope & Rules
The following vulnerabilities are excluded from the rewards for this bug bounty program:Attacks that the reporter has already exploited themselves, leading to damageAttacks requiring access to leaked keys/credentialsAttacks requiring access to privileged addresses (governance, strategist)
Websites and AppsTheoretical vulnerabilities without any proof or demonstrationContent spoofing / Text injection issuesSelf-XSSCaptcha bypass using OCRCSRF with no security impact (logout CSRF, change language, etc.)Missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”)Server-side information disclosure such as IPs, server names, and most stack tracesVulnerabilities used to enumerate or confirm the existence of users or tenantsVulnerabilities requiring unlikely user actionsURL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)Lack of SSL/TLS best practicesDDoS vulnerabilitiesAttacks requiring privileged access from within the organizationFeature requestsBest practicesVulnerabilities primarily caused by browser/plugin defectsAny vulnerability exploit requiring CSP bypass resulting from a browser bugUI related bugs
The following activities are prohibited by this bug bounty program:Any testing with mainnet or public testnet contracts; all testing should be done on private testnetsAny testing with pricing oracles or third party smart contractsAttempting phishing or other social engineering attacks against our employees and/or customersAny testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)Any denial of service attacksAutomated testing of services that generates significant amounts of trafficPublic disclosure of an unpatched vulnerability in an embargoed bounty
Our team strongly believes that this campaign will enhance Blast, by adding another layer of verification to our already existing test strategy. Furthermore, we would like to point out that we are excited to cooperate with the community to keep delivering bulletproof products that will empower Web3 development and accelerate adoption.
For more information on Immunefi’s coverage of Blast, please visit: https://immunefi.com/bounty/bwarelabs/
Immunefi is the premier bug bounty platform for smart contracts and DeFi projects, where security researchers review code, disclose vulnerabilities, get paid, and make crypto safer. Immunefi removes security risk through bug bounties and comprehensive security services.
Launched on December 9, 2020, Immunefi focused on blockchain and smart contract security. We provide bug bounty hosting, consultation, bug triaging, and program management services to blockchain and smart contract projects.
Bug bounty programs are open invitations to security researchers to discover and disclose potentially vulnerabilities in projects’ smart contracts and applications, thereby protecting projects and their users. For their good work, security researchers receive a reward based on the severity of the vulnerability, as determined by the project affected.
Why have a bug bounty program at all? In 2020 alone, hacks and scams cost the DeFi community over $238m, and bug bounties can prevent those hacks from happening. Bug bounty programs surface vulnerabilities so they can be fixed before they get exploited in malicious hacks that destroy projects and ruin reputations.
About Bware Labs
Bware Labs currently offers API support in Blast for the largest number of networks on the market, enabling development on multiple blockchains, and supporting a multi-chain future. Bware Labs has two lines of business, a multichain subscription-based API service for developers and businesses, Blast, and the company also runs validators for various blockchain projects, providing early support for successful projects in the crypto space.
Through Blast, Bware Labs’ main product, developers and companies needing blockchain data can create endpoints on their desired networks or use the Public API to interact and build on the blockchains they choose for their projects.
Bware Labs Decentralized API Infrastructure, Blast, aims to provide the most resilient infrastructure service and the fastest response times in the industry.
Blast is making use of clustering mechanisms and third-party node geographical distribution in order to help Web3 developers in getting their infrastructure needs covered easily and allow them to focus solely on the development of their applications.