Money on Chain-logo

Money on Chain

Money On Chain brings Bitcoin to mass adoption. To that end, it offers solutions to meet the needs of different types of users: a fully Bitcoin-collateralized stablecoin (DoC), a Bitcoin on steroids conceived for the long term bitcoin holder (BPro). All this, without requiring the delivery of private keys.

RSK
Defi
Stablecoin
Staking
Solidity
Maximum Bounty
$10,000
Live Since
14 January 2021
Last Updated
04 May 2026
  • Step-by-step PoC Required

  • KYC required

Select the category you'd like to explore

Assets in Scope

Target
Name
Added on
19 February 2022
Target
Name
Added on
19 February 2022
Target
Name
py_Moneyonchain
Added on
19 February 2022
Target
Name
Added on
19 February 2022
Target
Name
Added on
19 February 2022
Target
Name
Amphiraos-Oracle
Added on
19 February 2022
Target
Primacy Of Impact
Name
Added on
4 May 2026
Target
Primacy Of Impact
Name
Added on
4 May 2026

Impacts in Scope

Severity
Critical
Title

Critical Smart Contract Impact

Severity
Critical
Title

Manipulation of governance voting result deviating from voted outcome and resulting in a direct change from intended effect of original results

Severity
Critical
Title

Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield

Severity
Critical
Title

Direct theft of any user NFTs, whether at-rest or in-motion, other than unclaimed royalties

Severity
Critical
Title

Permanent freezing of funds

Severity
Critical
Title

Protocol insolvency

Severity
Critical
Title

Execute arbitrary system commands

Severity
Critical
Title

Retrieve sensitive data/files from a running server, such as:

  • /etc/shadow
  • database passwords
  • blockchain keys (this does not include non-sensitive environment variables, open source code, or usernames)
Severity
Critical
Title

Subdomain takeover with already-connected wallet interaction

Severity
Critical
Title

Direct theft of user funds

Severity
Critical
Title

Malicious interactions with an already-connected wallet, such as:

  • Modifying transaction arguments or parameters
  • Substituting contract addresses
  • Submitting malicious transactions
Severity
Critical
Title

Injection of malicious HTML or XSS through metadata

Out of scope

Program's Out of Scope information
  • Best practice critiques
  • Vulnerabilities requiring unlikely user actions
  • URL Redirects (unless combined with another vulnerability to produce other attacks)
  • Attacks requiring privileged access from within the organization
  • Known bugs and issues reported publicly in the target github repositories.
  • Attacks that cannot be actually executed they do not target the actual latest version of the contracts deployed.
  • Attacks that cannot be actually executed because they target functions that have been disabled (Most prominently, related to the discontinued BTCX and Settlement functionality).
  • Anything related to the "Vendors" staking and functionality. (A.I. tools 'detect' a non-issue and we're getting duplicates).
Default Out of Scope and rules

Smart Contract specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers