Autonolas-logo

Autonolas

Autonolas enables DAOs to create, run and own autonomous services that power next-gen apps in DAO operations, treasury management, AI, and beyond. Autonolas protocol provides means to build, register, co-own, manage and secure autonomous services: off-chain services which run as a multi-agent-system (MAS) and are replicated on a temporary consensus gadget (blockchain) while being crypto-economically secured on a public blockchain, hence offering robustness, transparency and decentralization off-chain.

ETH
Infrastructure
DAO
Services
Solidity
Maximum Bounty
$50,000
Live Since
10 August 2022
Last Updated
13 November 2024
  • PoC required

  • KYC required

Select the category you'd like to explore

Assets in Scope

Target
Type
Smart Contract - Polygon Target Dispenser L2
Added on
12 August 2024
Target
Type
Smart Contract - Wormhole Target Dispenser L2
Added on
12 August 2024
Target
Type
Smart Contract - Optimism Target Dispenser L2
Added on
12 August 2024
Target
Type
Smart Contract - Gnosis Target Dispenser L2
Added on
12 August 2024
Target
Type
Smart Contract - Arbitrum Target Dispenser L2
Added on
12 August 2024
Target
Type
Smart Contract - Polygon Deposit Processor L1
Added on
12 August 2024
Target
Type
Smart Contract - Wormhole Deposit Processor L1
Added on
12 August 2024
Target
Type
Smart Contract - Optimism Deposit Processor L1
Added on
12 August 2024
Target
Type
Smart Contract - Gnosis Deposit Processor L1
Added on
12 August 2024
Target
Type
Smart Contract - Arbitrum Deposit Processor L1
Added on
12 August 2024
Target
Type
Smart Contract - Ethereum Deposit Processor
Added on
12 August 2024
Target
Type
Smart Contract - Staking Verifier
Added on
12 August 2024

Impacts in Scope

Severity
Critical
Title

Any governance voting result manipulation

Severity
Critical
Title

Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield

Severity
Critical
Title

Permanent freezing of funds

Severity
Critical
Title

Protocol insolvency

Severity
High
Title

Theft of unclaimed yield

Severity
High
Title

Permanent freezing of unclaimed yield

Severity
High
Title

Temporary freezing of funds for more that 7 days

Severity
Medium
Title

Smart contract unable to operate due to lack of token funds

Severity
Medium
Title

Block stuffing for profit

Severity
Medium
Title

Griefing (e.g. no profit motive for an attacker, but damage to the users or the protocol)

Severity
Medium
Title

Theft of gas

Severity
Medium
Title

Unbounded gas consumption (Only governance related contracts are in scope for this kind of vulnerability, i.e. OLAS, Timelock, veOLAS, wveOLAS, Governor OLAS, Vote Weighting, FxGovernorTunnel, HomeMediator, OptimismMessenger, WormholeMessenger)

Out of scope

Program's Out of Scope information
  • Best practice critiques
  • Attacks that attempt to disrupt the protocol's availability, such as flooding the system with an excessive number of non-useful components or non-useful components within agents, resulting in gas resource exhaustion. Additionally, attacks that attempt to cause gas resource exhaustion issues by making minimal donations to a large number of services with numerous components.
  • All vulnerabilities that arise from misconfigured registration from users (e.g. component owners, agent owners, service owners, agents operators) or misuse of the registration logic (e.g. accidental locking of funds, loss of keys to control services, etc.).
  • Vulnerabilities that arise or are built upon the fact that GuardCM implies a reduction of the community multisig functionalities as originally designed, such us self-calls within community multisig.
  • The following are considered out of scope for “permanent freezing of funds” Critical Impact: when the freezing of funds is attributed to unintended use of the contracts: Component Registry, Agent Registry, Service Registry, Service Registry Token Utility, Registries Manager, Service Manager Token, Operator Whitelist, Gnosis Safe Multisig, Gnosis Safe Multisig Same Address, Service Registry L2, Service Manager.
  • The following contract are not in scope for “Griefing” Medium Impact: Component Registry, Agent Registry, Service Registry, Service Registry Token Utility, Registries Manager, Service Manager Token, Operator Whitelist, Gnosis Safe Multisig, Gnosis Safe Multisig Same Address, Service Registry L2, Service Manager
Default Out of Scope and rules

Smart Contract specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers
Severity
Min. - Max.
Critical
$50k
High
$20k
Medium
$5k
Low
$1k
Total Assets in Scope
42
Total Impacts in Scope
13