Attackathon | Plume Network-logo

Attackathon | Plume Network

Plume is a public, EVM-compatible blockchain optimized for the rapid adoption and demand-driven integration of real world assets (RWAs).

Solidity

Status

Finished
Primary Pool
$140,000
All Stars Pool
$40,000
Podium Pool
$20,000
Start Date
17 July 2025
End Date
14 August 2025
Rewards Token
USDC
Lines of Code
5,708
  • Triaged by Immunefi

  • Step-by-step PoC Required

  • Vault program

  • KYC required

This Attackathon Is Over

Thank You to All Participating Security Researchers!

Your valuable contributions played a crucial role in identifying and resolving critical vulnerabilities, helping to strengthen and secure the platform for all users.

Start Date
17 July 2025 18:00 UTC
End Date
14 August 2025 19:00 UTC

VaultImmunefi vault program

Funds available

$0

30d Avg. Funds availability

$6,665.54

Assets in vault

    Public vault address

    0x3d51fF143B44F5ceba339E6609F5F50b63D83e13

    Rewards

    Attackathon | Plume Network provides rewards in USDC on Ethereum, denominated in USD.

    Rewards by Threat Level

    Smart Contract
    Critical
    Portion of the Reward Pool
    High
    Portion of the Reward Pool
    Medium
    Portion of the Reward Pool
    Low
    Portion of the Reward Pool
    All categories *
    Insight
    Portion of the Reward Pool

    Reward Terms

    Rewards are distributed among SRs according to Immunefi’s Standardized Competition Reward Terms and includes All Star Pool and Podium Pool reserved for All Star Program participants.

    Rewards are denominated in USD and distributed in USDC on Ethereum.

    The reward pool is determined by the greatest severity bug found.

    • A Critical is found - $200,000 USD
    • A High is found - $150,000 USD
    • A Medium is found - $100,000 USD
    • A Low is found - $50,000 USD
    • If none of the above conditions apply then the reward pool is - $30,000 USD

    Private known issues, meaning known issues that were not publicly disclosed, are valid and unlock the corresponding reward pool.

    Code Freeze Assurance

    Code of the assets in scope is frozen while the program is live.

    Duplicate submissions of bugs are valid. Duplicate submissions of Insights are invalid.

    The project commits to keeping private all info related to bug findings until this program is over. This means the project will not leak info about any bug findings or planned bug fixes, including bug findings found independently by the project or from concurrent private audits.

    Insight Rewards Payment Terms

    Insight Rewards: Portion of the Rewards Pool

    *The "Insight" severity was introduced on Boost (Audit Competitions) & Attackathon programs to recognize contributions that extend beyond identifying immediate vulnerabilities. "Insights" underscores our commitment to valuing all types of contributions that contribute to a more secure environment. View more information about Insights

    Duplicates of Insight reports are not eligible for a reward.

    Proof of Concept (PoC) Requirements

    For this program, runnable PoC code is not required. Whitehats are instead required to write a step-by-step explanation of the PoC and impact. For unclear reports or to resolve disputes Immunefi may still require a runnable PoC.Read more about it in Audit Competition Proof-of-Concept Rules

    Program Overview

    Plume is a public, EVM-compatible blockchain optimized for the rapid adoption and demand-driven integration of real world assets (RWAs).

    For more information about Plume Network, please visit https://plume.org/.

    KYC required

    The submission of KYC information is a requirement for payout processing.

    Participants must adhere to the Eligibility Criteria.

    Proof of Concept

    Proof of concept is always required for all severities.

    Prohibited Activities

    Default prohibited activities
    • Any testing on mainnet or public testnet deployed code; all testing should be done on local-forks of either public testnet or mainnet
    • Any testing with pricing oracles or third-party smart contracts
    • Attempting phishing or other social engineering attacks against our employees and/or customers
    • Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
    • Any denial of service attacks that are executed against project assets
    • Automated testing of services that generates significant amounts of traffic
    • Public disclosure of an unpatched vulnerability in an embargoed bounty
    • Any other actions prohibited by the Immunefi Rules
    30d Avg. Funds Availability
    $6,665.54
    Total Assets in Scope
    28