title |
---|
The purpose of NEO Vulnerability bounty program is to be proactive about blockchain security by providing a channel for security researchers to report potential security vulnerabilities identified related to our underlying infrastructure. Everyone who find the vulnerabilities can send email to [email protected]. We will try our best to investigate those eligible vulnerabilities and fix the validity issues. All rewards will be paid in the equivalent amount of NEO.
Note: Higher rewards will be paid out in case of vulnerabilities of certain interest and criticality. Before reporting any issues, please check the following disclosures on responsibilities, program rules and reporting manner notice.
Level of vulnerabilities will undergo evaluation by the NEO R&D team based on severity, influence and other dimensions. As we will prioritize report assessment by risks and other factors, it may take time for our response. Time to first response (from report submission) will be 5 business days; time to triage (from report submission) will be 10 business days. NEO will regularly update the feedback on its website and social media channels. Rewards will be distributed within 3 days following official announcement. NEO reserves the right of final interpretation of the event.
To finally achieve the self-worthy reward the submitters should abide by the following event rules:
-
Only issues related to stability and security with design and implementation is within the scope, vulnerabilities with NEO website and related infrastructure (website, documents, third-party clients, blockchain browser, development tools, etc) on the NEO blockchain is out of the scope. Find more details at the Scope of Vulnerability Bounty Program.
-
Submitted reports should contain detailed reproduction procedures, in the absence of which, the reports will be excluded from the rewarding list. The more detailed about the proof of vulnerabilities and the descriptions are, the higher your reward will be.
-
For those who report the same vulnerability, the reward goes to whom comes first.
-
Serial vulnerabilities caused by one vulnerability will be considered as one vulnerability, e.g., a series of computing errors caused by data overflow.
Vulnerabilities fitting in any of the following descriptions will not be eligible for the rewards:
-
Those published or known ones are not eligible for rewards.
-
If you unveil such vulnerabilities before NEO fixes or publish them, the reward becomes null and void.
-
Participants who use submitted vulnerabilities to damage NEO ecosystem, infringe on users' interest and perform pilferage on users' assets will be disqualified for rewards; meanwhile, NEO is rightful to resort to justice.
Security vulnerabilities of the following projects must be addressed in the report to be eligible for the rewards:
Please, never attempt to access anyone else's data and do not engage in any activity that would be disruptive or damaging to NEO production network and testing network, you can investigate with your own built private chain.
Please include following in your report:
-
Asset - What software asset the vulnerability is related to (e.g. NEO core software/products)
-
Severity - Your opinion on the severity of the issue (e.g. high, moderate, low)
-
Summary - Add summary of the vulnerability
-
Description - Any additional details about this vulnerability
-
Steps - Steps to reproduce, getting NEO staff or technical team clearly informed of every detailed step.
-
Supporting Material/References - Source code to replicate, list any additional material (e.g. screenshots, logs, etc.)
-
Impact - What security impact could an attacker achieve?
-
Your name and country.
Bounties are paid out after a risk assessment (OWASP risk rating methodology) has been made by our R&D team. There are four rates of severity, Critical, High, Medium, Low. All rewards will be paid in the equivalent amount of NEO. Roughly speaking, we calculate the severity of an issue with the following formula:
Severity = Impact * Likelihood
Base bounty amounts which related with severity are as follows:
Vulnerability Severity | Bounty | Example |
---|---|---|
Critical | Up to $10,000 | Issues lead to severe asset loss |
High | Up to $5,000 | Issues lead to all network fail |
Medium | Up to $2,000 | Single node failure |
Low | Up to $500 | Other non-medium, high, critical valid issues |