## Formal Verification - Add TLA+ specs for UTXO conservation (formal/tla/UTXOConservation.tla) - Add TLA+ specs for GHOSTDAG ordering (formal/tla/GHOSTDAGOrdering.tla) - Add mathematical proof of DAA convergence (formal/proofs/) - Document Kani verification approach (formal/kani/) ## Bug Bounty Program - Add SECURITY.md with vulnerability disclosure process - Add docs/BUG_BOUNTY.md with $500-$100,000 reward tiers - Define scope, rules, and response SLA ## Web Wallet Dilithium3 WASM Integration - Build WASM module via Docker (498KB optimized) - Add wasm-crypto.ts lazy loader for Dilithium3 - Add createHybridSignatureLocal() for full client-side signing - Add createHybridSignatureSmart() for auto-mode selection - Add Dockerfile.wasm and build scripts ## Security Review ($0 Approach) - Add .github/workflows/security.yml CI workflow - Add deny.toml for cargo-deny license/security checks - Add Dockerfile.security for audit container - Add scripts/security-audit.sh for local audits - Configure cargo-audit, cargo-deny, cargo-geiger, gitleaks
5.7 KiB
Synor Bug Bounty Program
Overview
The Synor Bug Bounty Program rewards security researchers who discover and responsibly disclose vulnerabilities in the Synor blockchain protocol and its implementations.
Program Status: Active Platform: Immunefi
Scope
In-Scope Assets
| Asset | Type | Severity |
|---|---|---|
synor-consensus |
Smart Contract/Protocol | Critical |
synor-crypto |
Cryptography | Critical |
synor-vm |
Smart Contract VM | Critical |
synor-network |
Protocol/Network | High |
synor-dag |
Protocol Logic | High |
synor-rpc |
API/Web | Medium |
synord (node) |
Infrastructure | Medium |
| Web Wallet | Web/App | Medium |
| Explorer | Web/App | Low |
In-Scope Vulnerabilities
Critical (Blockchain/DeFi)
- Double-spending attacks
- Consensus manipulation
- Unauthorized minting/burning
- Private key extraction
- Signature forgery
- Eclipse attacks
- 51% attack vectors
High
- Denial of service (network-level)
- Memory corruption
- Integer overflows affecting security
- Cryptographic weaknesses
- Smart contract reentrancy
- Cross-contract vulnerabilities
Medium
- RPC authentication bypass
- Information disclosure
- Transaction malleability (non-security)
- Rate limiting bypass
Low
- UI/UX vulnerabilities
- Information leakage (non-sensitive)
- Best practice violations
Out of Scope
- Attacks requiring physical access
- Social engineering (phishing, etc.)
- Denial of service via resource exhaustion (without amplification)
- Third-party dependencies (report to upstream)
- Issues in test networks (unless exploitable on mainnet)
- Known issues listed in GitHub Issues
- Theoretical attacks without PoC
Rewards
| Severity | Reward (USD) | Examples |
|---|---|---|
| Critical | $50,000 - $100,000 | Double-spend, key extraction, consensus break |
| High | $10,000 - $50,000 | DoS, memory safety, crypto weakness |
| Medium | $2,500 - $10,000 | Auth bypass, info disclosure |
| Low | $500 - $2,500 | Minor issues, best practices |
Reward Factors
Rewards are determined by:
- Impact - What can an attacker achieve?
- Likelihood - How easy is exploitation?
- Quality - Report clarity and PoC quality
- Originality - First reporter, novel technique
Bonus Multipliers
| Factor | Multiplier |
|---|---|
| Working PoC | +25% |
| Suggested fix | +10% |
| Mainnet-ready exploit | +50% |
| Novel attack vector | +25% |
Rules
Eligibility
- You must be the first to report the vulnerability
- You must not have exploited the vulnerability
- You must not disclose publicly before fix is deployed
- You must comply with all applicable laws
- Synor team members are not eligible
Responsible Disclosure
- Report - Submit via Immunefi platform
- Confirm - We acknowledge within 24 hours
- Triage - We assess severity within 72 hours
- Fix - We develop and test a fix
- Deploy - Fix is deployed to production
- Disclose - Public disclosure after 30 days (or sooner if agreed)
- Reward - Payment processed within 14 days of fix deployment
Good Faith
We will not pursue legal action against researchers who:
- Act in good faith
- Do not access user data
- Do not disrupt services
- Report promptly
- Do not demand payment beyond program terms
How to Report
Via Immunefi (Preferred)
- Go to immunefi.com/bounty/synor
- Click "Submit Report"
- Fill out the vulnerability details
- Include PoC if possible
- Submit and wait for acknowledgment
Via Email (Alternative)
If Immunefi is unavailable:
Email: security@synor.cc PGP Key: [link to key]
Include:
- Vulnerability description
- Steps to reproduce
- Impact assessment
- Your wallet address (for payment)
Report Quality
A good report includes:
## Summary
Brief description of the vulnerability
## Severity
Your assessment (Critical/High/Medium/Low)
## Affected Component
Which crate/module/file
## Steps to Reproduce
1. Step one
2. Step two
3. ...
## Proof of Concept
Code or commands to demonstrate
## Impact
What an attacker could achieve
## Suggested Fix
(Optional) How to fix it
Response SLA
| Action | Timeframe |
|---|---|
| Initial response | 24 hours |
| Severity assessment | 72 hours |
| Fix development | 7-30 days (severity dependent) |
| Reward payment | 14 days after fix |
| Public disclosure | 30 days after fix |
FAQ
Q: Can I test on mainnet?
A: No. Use testnet only. Mainnet exploitation will disqualify you.
Q: What if I accidentally cause damage?
A: If you acted in good faith and reported immediately, we will not pursue action.
Q: Can I publish my findings?
A: Yes, after the fix is deployed and disclosure period ends.
Q: How are duplicate reports handled?
A: First valid report wins. Duplicates may receive partial reward for additional info.
Q: What currencies do you pay in?
A: USDC, USDT, or SYNOR tokens (your choice).
Hall of Fame
| Researcher | Finding | Severity | Date |
|---|---|---|---|
| Be the first! | - | - | - |
Contact
- Security Team: security@synor.cc
- Immunefi Program: immunefi.com/bounty/synor
- Discord: #security-reports (for general questions only)
Legal
This program is governed by the Synor Bug Bounty Terms of Service. By participating, you agree to these terms.
Synor reserves the right to:
- Modify program terms with 30 days notice
- Determine severity classifications
- Withhold payment for policy violations
Last Updated: January 2026