Goldfinch
Submit a BugProgram Overview
Goldfinch is a decentralized protocol that allows for crypto borrowing without crypto collateral. The Goldfinch protocol has four core participants: Borrowers, Backers, Liquidity Providers, and Auditors.
Borrowers are participants who seek financing, and they propose Borrower Pools for the Backers to assess. Borrower Pools contain the terms a Borrower seeks, like the interest rate and repayment schedule.
Backers assess the Borrower Pools and decide whether to supply first-loss capital. After Backers supply capital, Borrowers can borrow and repay through the Borrower Pool.
Liquidity Providers supply capital to the Senior Pool in order to earn passive yield. The Senior Pool uses the Leverage Model to automatically allocate capital to the Borrower Pools, based on how many Backers are participating in them. When the Senior Pool allocates capital, a portion of its interest is reallocated to the Backers. This increases the Backers’ effective yield, which incentives them to both provide the higher-risk first-loss capital and do the work of assessing Borrower Pools.
Lastly, Auditors vote to approve Borrowers, which is required before they can borrow. Auditors are randomly selected by the protocol, and they provide a human-level check to guard against fraudulent activity.
For more information about Goldfinch, please visit https://goldfinch.finance/.
This bug bounty program is focused on their smart contracts and app and is focused on preventing the following impacts:
- Loss of user funds
- Loss of governance funds
- Incorrect or unintended behavior relating to money transfers (ie. user input is for 10 USDC, and we actually try to move 100 USDC)
- Logical bugs relating to calculation of interest or principal owed, or payment dates, etc.
- Temporary freezing of user or governance funds.
- Unable to call smart contract
- Pointing to an incorrect smart contract from our frontend
Rewards by Threat Level
Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System V2.2. This is a simplified 5-level scale, with separate scales for websites/apps and smart contracts/blockchains, encompassing everything from consequence of exploitation to privilege required to likelihood of a successful exploit.
All web/app bug reports must come with a PoC in order to be considered for a reward.
“Clickjacking state-changing” is considered as Medium if it can result in any user losing funds or being tricked into unintended behavior involving money through Goldfinch’s front-ends. It is considered “High” if it could result in greater than USD 10 000 worth of such damages.
Critical bug reports are further capped at 10% of economic damage, primarily taking into account the funds at risk but also potentially accounting for PR and branding considerations, at the discretion of the Goldfinch team. The economic damage caused by the bug must be greater than the equivalent of USD 200 000 for it to be considered Critical and the minimum reward for Critical vulnerabilities is USD 20 000.
In order to be eligible for a reward, the following terms and conditions must be met:
- Identify an original, previously unreported, non-public vulnerability within the scope of the Goldfinch bug bounty program as described.
- Include sufficient detail in your disclosure to enable our engineers to quickly reproduce, understand, and fix the vulnerability.
- Be at least 18 years of age.
- Be reporting in an individual capacity, or if employed by a company, reporting with the company’s written approval to submit a disclosure to Goldfinch.
- Not be subject to US sanctions or reside in a US-embargoed country.
- Not be a current or former Goldfinch employee, vendor, contractor, or employee of a Goldfinch vendor or contractor.
Vulnerabilities in contracts built on top of Goldfinch by third-party developers (such as smart contract wallets) are not in-scope, nor are vulnerabilities that require ownership of an admin key.
Known bugs found at the following link are considered out of scope for the program:
Payouts are handled by the Goldfinch team directly and are denominated in USD. However, payouts are done in USDC.
Smart Contract
- Critical
- Level
- Up to USD $500,000
- Payout
- High
- Level
- Up to USD $20,000
- Payout
- Medium
- Level
- Up to USD $5,000
- Payout
Websites and Applications
- Critical
- Level
- Up to USD $50,000
- Payout
- High
- Level
- Up to USD $20,000
- Payout
Assets in scope
- Smart Contract - AccountantType
- Smart Contract - BorrowerType
- Smart Contract - ConfigOptionsType
- Smart Contract - CreditLineType
- Smart Contract - FiduType
- Smart Contract - FixedLeverageRatioStrategyType
- Smart Contract - GoldfinchConfigType
- Smart Contract - GoldfinchFactoryType
- Smart Contract - MigratedTranchedPoolType
- Smart Contract - PoolTokensType
- Smart Contract - SeniorPoolType
- Smart Contract - TranchedPoolType
- Smart Contract - WithdrawalRequestTokenType
- Smart Contract - StakingRewardsType
- Smart Contract - MembershipVaultType
- Smart Contract - MembershipOrchestratorType
- Smart Contract - MembershipLedgerType
- Smart Contract - MembershipCollectorType
- Smart Contract - GFILedgerType
- Smart Contract - ERC20SplitterType
- Smart Contract - CapitalLedgerType
- Smart Contract - BackerRewardsType
- Smart Contract - CallableLoanType
- Websites and ApplicationsType
All smart contracts of Goldfinch can be found at https://github.com/goldfinch-eng/goldfinch-contracts. However, only those in the Assets in Scope table are considered as in-scope of the bug bounty program.
Impacts in scope
Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.
Smart Contract
- Loss of user fundsCriticalImpact
- Loss of governance fundsCriticalImpact
- Unintended behavior relating to money transfers (ie. user input is for 10 USDC, and we actually try to move 100 USDC)CriticalImpact
- Loss of principle user fundsCriticalImpact
- Theft of yieldCriticalImpact
- Logical bugs relating to calculation of interest or principal owed, or payment dates, etc.CriticalImpact
- Temporary freezing of user or governance fundsHighImpact
- Theft of yield equal to or below USD 200 000HighImpact
- Failure of access controlsHighImpact
- Unable to call smart contractMediumImpact
- Smart contract unable to operate due to lack of token fundsMediumImpact
- Block stuffing for profitMediumImpact
- Theft of gasMediumImpact
- Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)MediumImpact
- Unbounded gas consumptionMediumImpact
Websites and Applications
- Incorrect or unintended behavior relating to money. (ie. user input is for 10 USDC on the app, and we actually send 100 USDC to the smart contract)CriticalImpact
- We are pointing to an incorrect smart contractHighImpact
- Cross-site request forgery (CSRF)HighImpact
- Cross-site scripting (XSS)HighImpact
- “Clickjacking state-changing” that can result in any user losing funds or being tricked into unintended behavior involving money through Goldfinch’s front-ends (only if the total impact is equal to or greater than USD 10 000)HighImpact
Out of Scope & Rules
The following vulnerabilities are excluded from the rewards for this bug bounty program:
- Attacks that the reporter has already exploited themselves, leading to damage
- Attacks requiring access to leaked keys/credentials
- Attacks requiring access to privileged addresses (governance, strategist, borrowers, etc.)
- All known issues found here: https://goldfinchfinance.notion.site/ImmuneFi-Publication-List-of-Known-Goldfinch-Protocol-Issues-2a222523415640f886d1bb8f10f622ef
Smart Contracts and Blockchain
- Incorrect data supplied by third party oracles
- Not to exclude oracle manipulation/flash loan attacks
- Basic economic governance attacks (e.g. 51% attack)
- Lack of liquidity
- Best practice critiques
- Sybil attacks
Websites and Apps
- Theoretical vulnerabilities without any proof or demonstration
- Content spoofing / Text injection issues
- Self-XSS
- Captcha bypass using OCR
- CSRF with no security impact (logout CSRF, change language, etc.)
- Missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”)
- Server-side information disclosure such as IPs, server names, and most stack traces
- Vulnerabilities used to enumerate or confirm the existence of users or tenants
- Vulnerabilities requiring unlikely user actions
- URL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)
- Lack of SSL/TLS best practices
- DDoS vulnerabilities
- Attacks requiring privileged access from within the organization
- Feature requests
- Best practices
The following activities are prohibited by this bug bounty program:
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
- Any testing with pricing oracles or third party smart contracts
- Attempting phishing or other social engineering attacks against our employees and/or customers
- Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
- Any denial of service attacks
- Automated testing of services that generates significant amounts of traffic
- Public disclosure of an unpatched vulnerability in an embargoed bounty