Attackathon | Plume Network-logo

Attackathon | Plume Network

Plume is a public, EVM-compatible blockchain optimized for the rapid adoption and demand-driven integration of real world assets (RWAs).

Solidity

Live

15d: 3h remaining
Primary Pool
$140,000
All Stars Pool
$40,000
Podium Pool
$20,000
Start Date
17 July 2025
End Date
14 August 2025
Rewards Token
USDC
Lines of Code
5,708
  • Triaged by Immunefi

  • Step-by-step PoC Required

  • KYC required

This Attackathon Is Live!

A conditional $200,000 USD is in rewards for finding bugs on Plume Network's code.

You can ask technical questions to the Plume Network Team directly in the #plume-network-attackathon channel in Immunefi's Discord.

When the Plume Network Attackathon ends, Immunefi will publish a leaderboard and Attackathon findings report.

Start Date
17 July 2025 18:00 UTC
End Date
14 August 2025 19:00 UTC

Rewards

Attackathon | Plume Network provides rewards in USDC on Ethereum, denominated in USD.

Rewards by Threat Level

Smart Contract
Critical
Portion of the Reward Pool
High
Portion of the Reward Pool
Medium
Portion of the Reward Pool
Low
Portion of the Reward Pool
All categories *
Insight
Portion of the Reward Pool

Reward Terms

Rewards are distributed among SRs according to Immunefi’s Standardized Competition Reward Terms and includes All Star Pool and Podium Pool reserved for All Star Program participants.

Rewards are denominated in USD and distributed in USDC on Ethereum.

The reward pool is determined by the greatest severity bug found.

  • A Critical is found - $200,000 USD
  • A High is found - $150,000 USD
  • A Medium is found - $100,000 USD
  • A Low is found - $50,000 USD
  • If none of the above conditions apply then the reward pool is - $30,000 USD

Private known issues, meaning known issues that were not publicly disclosed, are valid and unlock the corresponding reward pool.

Code Freeze Assurance

Code of the assets in scope is frozen while the program is live.

Duplicate submissions of bugs are valid. Duplicate submissions of Insights are invalid.

The project commits to keeping private all info related to bug findings until this program is over. This means the project will not leak info about any bug findings or planned bug fixes, including bug findings found independently by the project or from concurrent private audits.

Insight Rewards Payment Terms

Insight Rewards: Portion of the Rewards Pool

*The "Insight" severity was introduced on Boost (Audit Competitions) & Attackathon programs to recognize contributions that extend beyond identifying immediate vulnerabilities. "Insights" underscores our commitment to valuing all types of contributions that contribute to a more secure environment. View more information about Insights

Duplicates of Insight reports are not eligible for a reward.

Proof of Concept (PoC) Requirements

For this program, runnable PoC code is not required. Whitehats are instead required to write a step-by-step explanation of the PoC and impact. For unclear reports or to resolve disputes Immunefi may still require a runnable PoC.Read more about it in Audit Competition Proof-of-Concept Rules

Program Overview

Plume is a public, EVM-compatible blockchain optimized for the rapid adoption and demand-driven integration of real world assets (RWAs).

For more information about Plume Network, please visit https://plume.org/.

KYC required

The submission of KYC information is a requirement for payout processing.

Participants must adhere to the Eligibility Criteria.

Proof of Concept

Proof of concept is always required for all severities.

Prohibited Activities

Default prohibited activities
  • Any testing on mainnet or public testnet deployed code; all testing should be done on local-forks of either public testnet or mainnet
  • Any testing with pricing oracles or third-party smart contracts
  • Attempting phishing or other social engineering attacks against our employees and/or customers
  • Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
  • Any denial of service attacks that are executed against project assets
  • Automated testing of services that generates significant amounts of traffic
  • Public disclosure of an unpatched vulnerability in an embargoed bounty
  • Any other actions prohibited by the Immunefi Rules