Illuvium-logo

Illuvium

Welcome to the world of Illuvium. A shattered land of beauty and wonder. Travel the vast and varied landscape hunting dangerous beasts, then capture them to battle in the Arenas or trade via the exchange.

ETH
Defi
NFT
Gaming
Staking
JavaScript
Solidity
Maximum Bounty
$100,000
Live Since
14 June 2022
Last Updated
18 November 2024
  • PoC required

Select the category you'd like to explore

Assets in Scope

Target
Type
Smart Contract - LandERC721 (Proxy)
Added on
7 December 2022
Target
Type
Smart Contract - LandERC721 (Impl)
Added on
7 December 2022
Target
Type
Smart Contract - Land Sale (Proxy)
Added on
7 December 2022
Target
Type
Smart Contract - LandERC721 (Proxy)
Added on
9 November 2022
Target
Type
Smart Contract - LandERC721 (Impl)
Added on
9 November 2022
Target
Type
Smart Contract - Land Sale (Proxy)
Added on
9 November 2022
Target
Type
Smart Contract - Land Sale (Impl)
Added on
9 November 2022
Target
Type
Smart Contract - StakingV2 ILV Pool
Added on
14 June 2022
Target
Type
Smart Contract - StakingV2 LP Pool
Added on
14 June 2022
Target
Type
Smart Contract - StakingV2 Factory
Added on
14 June 2022
Target
Type
Websites and Applications - Main Web
Added on
14 June 2022
Target
Type
Websites and Applications - Staking
Added on
14 June 2022

Impacts in Scope

Severity
Critical
Title

Substantial loss of funds (>=1,000,000 USD) resulting in direct benefit of a malicious party

Severity
Critical
Title

Complete authentication bypass (ability to fully impersonate another user/player and perform financial actions on their behalf) - except those excluded via the out-of-scope section below

Severity
Critical
Title

3rd party API key/token leakage that could cause substantial financial loss

Severity
Critical
Title

Private key / seed / mnemonic leakage that could cause substantial financial loss

Severity
High
Title

Loss of funds that does not result into direct benefit of a malicious party or the benefit to the malicious party is relatively small compared to the financial impact (in terms of cost of effort to address, brand damage as well as damage to treasury funds)

Severity
High
Title

Code/system command execution on a remote system which would undermine all server-side controls

Severity
High
Title

Subdomain takeovers which could lead to financial loss (e.g. initiate / sign transaction from the taken-over domain)

Severity
High
Title

Vertical privilege escalation (e.g. a player performing administrative or internal tasks which could circumvent business logic or server side controls)

Severity
High
Title

Persistent XSS which could result to financial loss

Severity
Medium
Title

Issues that do not directly result in loss of funds, but may have indirect financial impact (cause brand damage, or result in temporary unavailability of a service/contract, or lead to significant increased gas costs

Severity
Medium
Title

DoS excluding load-based (D)DoS

Severity
Medium
Title

NoSQL/SQL injection without financial loss

Out of scope

Program's Out of Scope information
  • Any assets (including, but not limited to, ERC20, ERC721, ERC1155) accidentally* sent to any of the deployed contracts may get lost.

  • *) Not in a designed way (example: via ERC20 transfer function)

  • Load-based DoS/DDoS

  • Clickjacking attacks without a documented series of clicks that produce a vulnerability

  • Assumed vulnerabilities based upon version numbers only

  • Attacks that require social engineering / phishing

  • Spam (including issues related to SPF/DKIM/DMARC)

  • Detailed errors/stack traces by themselves, unless they can be used to aid finding or exploiting subsequent issues in scope.

  • Vulnerabilities that require access to passwords, tokens, or the local system

  • Attacks bypassing functions of AWS Cognito, such as authentication

  • Best practice critiques

Default Out of Scope and rules

Smart Contract specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers
Severity
Min. - Max.
Critical
$25k -$100k
High
$30k
Medium
$2k -$10k
Low
$1k
Total Assets in Scope
15
Total Impacts in Scope
17