DODO
DODO is a decentralized exchange platform powered by the Proactive Market Maker (PMM) algorithm. It features highly capital-efficient liquidity pools that support single-token provision, reduce impermanent loss, and minimize slippage for traders. The trading platform also offers SmartTrade, a decentralized liquidity aggregation service that routes to and compares various liquidity sources to quote the optimal prices between any two tokens.
PoC required
Select the category you'd like to explore
Assets in Scope
Impacts in Scope
The following contracts are not included in this bug bounty program:
Out of scope
The following vulnerabilities are excluded from the rewards for this bug bounty program:
- Attacks that the reporter has already exploited themselves, leading to damage
- Attacks requiring access to leaked keys/credentials
- Attacks requiring access to privileged addresses (governance, strategist)
- Incorrect data supplied by third party oracles
- Not to exclude oracle manipulation/flash loan attacks
- Basic economic governance attacks (e.g. 51% attack)
- Lack of liquidity
- Best practice critiques
- Sybil attacks
- FeeRouteProxy exclusions: FeeRouteProxy.sol won't left any tokens in normal swap, so we don't abandon using tokens in the proxy through specific swap method
The following contracts are out of scope and NO bounty will be paid:
- contracts/CollateralVault/
- contracts/DODODrops
- contracts/Factory/Registries/DODONFTRegistry.sol
- contracts/Factory/DODONFT.sol
- contracts/Factory/DODONFT1155.sol
- contracts/Factory/NFTTokenFactory.sol
- contracts/GeneralizedFragment/
- contracts/NFTPool/
- contracts/SmartRoute/helper/DODONFTRouteHelper.sol
- contracts/SmartRoute/proxies/DODODropsProxy.sol
- contracts/SmartRoute/proxies/DODONFTPoolProxy.sol
- contracts/SmartRoute/proxies/DODONFTProxy.sol
- contracts/SmartRoute/DODONFTApprove.sol
The following activities are prohibited by this bug bounty program:
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
- Any testing with pricing oracles or third party smart contracts
- Attempting phishing or other social engineering attacks against our employees and/or customers
- Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
- Any denial of service attacks
- Automated testing of services that generates significant amounts of traffic
- Public disclosure of an unpatched vulnerability in an embargoed bounty