Perennial
Submit a BugProgram Overview
Perennial is a DeFi-native derivatives primitive that allows for the creation of two-sided markets that trade exposure to an underlying price feed in a capital efficient manner.
Perennial acts as a peer-to-pool derivatives AMM that perpetually offers to take the other side of any Taker’s position directly at the oracle price, in exchange for a funding rate that floats based on utilization of the liquidity pool (Compound-style).
Takers (Traders) deposit collateral to get leveraged exposure to different price feeds (long, short, and exotic payoffs). Makers (Liquidity Providers) pool capital in the protocol to earn fees for taking the other side of Taker trades.
On a continuous, on-going basis, LPs and traders settle up; the losing side of the trade pays the winning side.
Perennial is minimialist at its core, designed to be a low-level, unopinionated primitive that lays the basic infrastructure and leaves the rest up to market creators and participants to define/optimize.
Perennial Features:
- Peer-to-Pool AMM — trade against a pool of capital, without having to find a counterparty to take the other side of a trade
- Zero price slippage — trade directly at the current price, regardless of size
- Cash-settled — trades settled in $USD, not crypto, in line the most popular crypto derivatives
- Utilization-based Funding Rate — funding varies with pool utilization, creating an extremely simple, continuous funding rate
- Two-sided Leverage — Takers & Makers can both trade with significant leverage, amplifying capital efficiency
- Maximum LP flexibility — Fuse is to Compound, as Perennial is to GMX. LPs (makers) can customize their risk exposure, pricing curve, hedging strategy (or lack thereof); Perennial makes very few assumption about this at the protocol level, giving LPs full control
- Developer-oriented & built for composability — With just a few lines of code, developers can build exposure to any asset by customizing the payoff function, utilization curve (pricing), oracle, fee model, etc.
- Permissionless — permissionless market creation, integration, and composability.
For more information about Perennial, please visit their github & documentation.
Rewards by Threat Level
Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System V2.2. This is a simplified 5-level scale, with separate scales for websites/apps, smart contracts, and blockchains/DLTs, focusing on the impact of the vulnerability reported.
All Critical and High severity bug reports must come with a PoC with an end-effect impacting an asset-in-scope in order to be considered for a reward. Explanations and statements are not accepted as PoC and code is required.
Rewards for critical smart contract vulnerabilities are further capped at 10% of economic damage, with the main consideration being the funds affected in addition to PR and brand considerations, at the discretion of the team.
Critical payouts above USD 50 000 are done by Sherlock and will only be paid out for critical bugs that would result in a loss of funds and can be executed profitably, and this then excludes Sherlock critical bounty payouts for temporary freezing bugs. If further clarification is needed to decide on a Sherlock payout, the coverage agreement between Perennial and Sherlock should be referenced.
Hence, any Critical severity report that does not qualify for a payout from Sherlock will have a maximum payout of USD 50 000, paid out by the Perennial team.
Any loss of funds or yield due to improper product parameters set by the product owner are considered out of scope of the program. The settable product parameters can be viewed here: https://github.com/equilibria-xyz/perennial-mono/blob/master/packages/perennial/contracts/interfaces/IParamProvider.sol#L7
In addition, known issues highlighted in the following audit reports are also considered out of scope:
- https://github.com/equilibria-xyz/perennial-mono/tree/master/packages/perennial/audits
- Code4rena Audit
Issues identified in previous audit reports may not be eligible for payout.
To be eligible for reward, impact from table below must be demonstrated where all thefts must be profitable and all freezing must be reasonably priced for the impact.
KYC REQUIREMENT
Name, government ID, and country of residence will be required to fulfill KYC.
Payouts for all bug reports are denominated in USD. Payouts for High, Medium and Low severity bug reports are handled by the Perennial team directly and are done in USDC. Payments for Critical severity bug reports are done by Sherlock with their bug bounty matching program and are done in USDC.
Smart Contract
- Critical
- Level
- Up to USD 500,000
- Payout
- High
- Level
- USD 25,000
- Payout
- Medium
- Level
- USD 5,000
- Payout
- Low
- Level
- USD 1,000
- Payout
Assets in scope
- Smart Contract - ChainlinkOracle_ETHType
- Smart Contract - Collateral_ProxyType
- Smart Contract - Controller_ProxyType
- Smart Contract - ForwarderType
- Smart Contract - MultiInvoker_ProxyType
- Smart Contract - Incentivizer_ProxyType
- Smart Contract - ProxyAdminType
- Smart Contract - TimelockControllerType
- Smart Contract - Product_UpgradeableBeaconType
- Smart Contract - TwoWayBatcherType
- Smart Contract - ChainlinkOracle_ETHType
- Smart Contract - Collateral_ProxyType
- Smart Contract - Controller_ProxyType
- Smart Contract - MultiInvoker_ProxyType
- Smart Contract - Incentivizer_ProxyType
- Smart Contract - ProxyAdminType
- Smart Contract - TimelockControllerType
- Smart Contract - Product_UpgradeableBeaconType
- Smart Contract - Balanced VaultType
- Smart Contract - Balanced VaultType
Though only the proxy contracts are listed as in-scope, current implementation and any further updates to the implementation contracts are considered in scope. When reporting a bug, please make sure to select the relevant proxy smart contract as the target.
All smart contracts of Perennial can be found at https://github.com/equilibria-xyz/perennial-mono. However, only those in the Assets in Scope table are considered as in-scope of the bug bounty program.
Impacts in scope
Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.
Smart Contract
- Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yieldCriticalImpact
- Permanent freezing of fundsCriticalImpact
- Theft of unclaimed yieldCriticalImpact
- Permanent freezing of unclaimed yieldCriticalImpact
- Theft of unclaimed yieldHighImpact
- Permanent freezing of unclaimed yieldHighImpact
- Smart contract unable to operate due to lack of token fundsMediumImpact
- Block stuffing for profitMediumImpact
- Theft of gasMediumImpact
- Temporary freezing of protocol and/or fundsMediumImpact
- Smart contract fails to deliver promised returns, but doesn’t lose valueLowImpact
Out of Scope & Rules
The following vulnerabilities are excluded from the rewards for this bug bounty program:
- Attacks that the reporter has already exploited themselves, leading to damage
- Attacks requiring access to leaked keys/credentials
- Attacks requiring access to privileged addresses (governance, strategist)
Smart Contracts and Blockchain
- Incorrect data supplied by third party oracles
- Not to exclude oracle manipulation/flash loan attacks
- Basic economic governance attacks (e.g. 51% attack)
- Lack of liquidity
- Best practice critiques
- Sybil attacks
- Centralization risks
The following activities are prohibited by this bug bounty program:
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
- Any testing with pricing oracles or third party smart contracts
- Attempting phishing or other social engineering attacks against our employees and/or customers
- Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
- Any denial of service attacks
- Automated testing of services that generates significant amounts of traffic
- Public disclosure of an unpatched vulnerability in an embargoed bounty