Aster is a next-generation decentralized perpetual exchange built for everyone, committed to delivering a seamless, powerful, and truly decentralized on-chain derivatives trading experience. From one-click trading to smart automation and deep on-chain liquidity, Aster is rethinking how DeFi should work — simple, efficient, and built for users.
PoC Required
Select the category you'd like to explore
Assets in Scope
Impacts in Scope
Retrieve sensitive data/files from a running server, such as:
- /etc/shadow
 - database passwords
 - blockchain keys (this does not include non-sensitive environment variables, open source code, or usernames)
 
Taking down the application/website
Subdomain takeover with already-connected wallet interaction
Direct theft of user funds
Malicious interactions with an already-connected wallet, such as:
- Modifying transaction arguments or parameters
 - Substituting contract addresses
 - Submitting malicious transactions
 
Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield
Permanent freezing of funds
Protocol insolvency
Injecting/modifying the static content on the target application without JavaScript (persistent), such as:
- HTML injection without JavaScript
 - Replacing existing text with arbitrary text
 - Arbitrary file uploads, etc.
 
Subdomain takeover without already-connected wallet interaction
Theft of unclaimed yield
Temporary freezing of funds
Out of scope
Web & App specific
- Theoretical impacts without any proof or demonstration
 - Impacts involving attacks requiring physical access to the victim device
 - Impacts involving attacks requiring access to the local network of the victim
 - Reflected plain text injection (e.g. url parameters, path, etc.)
- This does not exclude reflected HTML injection with or without JavaScript
 - This does not exclude persistent plain text injection
 
 - Any impacts involving self-XSS
 - Captcha bypass using OCR without impact demonstration
 - CSRF with no state modifying security impact (e.g. logout CSRF)
 - Impacts related to missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”) without demonstration of impact
 - Server-side non-confidential information disclosure, such as IPs, server names, and most stack traces
 - Impacts causing only the enumeration or confirmation of the existence of users or tenants
 - Impacts caused by vulnerabilities requiring un-prompted, in-app user actions that are not part of the normal app workflows
 - Lack of SSL/TLS best practices
 - Impacts that only require DDoS
 - UX and UI impacts that do not materially disrupt use of the platform
 - Impacts primarily caused by browser/plugin defects
 - Leakage of non sensitive API keys (e.g. Etherscan, Infura, Alchemy, etc.)
 - Any vulnerability exploit requiring browser bugs for exploitation (e.g. CSP bypass)
 - SPF/DMARC misconfigured records)
 - Missing HTTP Headers without demonstrated impact
 - Automated scanner reports without demonstrated impact
 - UI/UX best practice recommendations
 - Non-future-proof NFT rendering
 
All categories
- Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
 - Impacts caused by attacks requiring access to leaked keys/credentials
 - Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
 - Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
 - Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
 - Best practice recommendations
 - Feature requests
 - Impacts on test files and configuration files unless stated otherwise in the bug bounty program
 - Impacts requiring phishing or other social engineering attacks against project's employees and/or customers
 


