Moonbeam Network-logo

Moonbeam Network

Moonbeam is an Ethereum-compatible smart contract platform on the Polkadot network that makes it easy to build natively interoperable applications. This Ethereum compatibility allows developers to deploy existing Solidity smart contracts and DApp frontends to Moonbeam with minimal changes. As a parachain on the Polkadot network, Moonbeam benefits from the shared security of the Polkadot relay chain and integrations with other chains that are connected to Polkadot.

Polkadot
Blockchain
L1
Rust
Maximum Bounty
$100,000
Live Since
16 December 2021
Last Updated
21 November 2024
  • PoC required

  • KYC required

Select the category you'd like to explore

Assets in Scope

Target
Type
Websites and Applications
Added on
13 May 2022
Target
Type
Websites and Applications
Added on
13 May 2022
Target
Type
Websites and Applications
Added on
13 May 2022
Target
Type
Blockchain/DLT - RPC Infrastructure (Moonbeam)
Added on
10 May 2022
Target
Type
Blockchain/DLT - RPC Infrastructure (Moonbase Alpha)
Added on
10 May 2022
Target
Type
Blockchain/DLT - RPC Infrastructure (Moonriver)
Added on
10 May 2022
Target
Type
Blockchain/DLT - Frontier
Added on
10 May 2022
Target
Type
Blockchain/DLT - Blockchain - Crowdloan Rewards
Added on
20 April 2022
Target
Type
Blockchain/DLT - Blockchain - Nimbus
Added on
20 April 2022
Target
Type
Blockchain/DLT - Blockchain - Moonbeam
Added on
20 April 2022

Impacts in Scope

Severity
Critical
Title

An attack triggering the network not being able to confirm new transactions (Total network shutdown)

Severity
Critical
Title

An attack causing an unintended permanent chain split requiring hard fork (Network partition requiring hard fork)

Severity
Critical
Title

An attack causing direct loss of funds

Severity
Critical
Title

An attack causing permanent freezing of funds (fix requires hardfork)

Severity
Critical
Title

An attack causing the minting/creation of network utility tokens (MOVR/GLMR) outside of the normal, on-chain inflation mechanism

Severity
Critical
Title

Ability to execute system commands

Severity
Critical
Title

Extract Sensitive data/files from the server such as /etc/passwd

Severity
Critical
Title

Stealing User Cookies

Severity
Critical
Title

Signing transactions for other users

Severity
Critical
Title

Redirection of user deposits and withdrawals

Severity
Critical
Title

Wallet interaction modification resulting in financial loss

Severity
Critical
Title

Subdomain takeover resulting in financial loss (applicable for subdomains with addresses published)

Out of scope

Program's Out of Scope information

The following vulnerabilities are explicitly excluded from the rewards for this bug bounty program:

  • Attacks that the reporter has already exploited themselves, leading to damage
  • Attacks requiring access to leaked keys/credentials
  • Attacks requiring access to privileged addresses (governance, strategist)
  • Attacks relying in whole or in part on social engineering, deception or phishing attacks
  • Vulnerabilities in third-party dependencies not under Moonbeam Foundation's control, especially when no known fix exists at the time of the report. Such vulnerabilities should be reported to the respective third-party organizations responsible for the code. If we cannot fix the vulnerability, we will not pay a bounty.
  • Bugs or vulnerabilities in external services or platforms that Moonbeam Network uses but does not control.
  • Broken link hijacking is out of scope
  • Non-Production Code: Any code present in the in-scope repositories that has not yet been deployed to the production Moonbeam or Moonriver networks is out of scope.
  • Theoretical Vulnerabilities: Vulnerabilities that are purely theoretical without practical exploitability. This includes exploits requiring unrealistic scenarios, assumptions, or clear human error.
  • Excessive Investment Attacks: Attacks that require an impractically high investment beyond reasonable means (e.g., requiring more than $100 million USD to execute).
  • User Negligence: Issues that arise solely from user misconfiguration or negligence, where exploitation is possible only if users ignore standard security practices.
  • Low-Impact DoS Attacks: Denial-of-Service (DoS) attacks that are temporary and do not result in significant disruption or measurable financial loss.
  • Best Practice Suggestions: Code optimizations, style guidelines, or recommendations that do not have a direct security impact.
  • Cosmetic Issues: Aesthetic issues, including typos, branding inconsistencies, or minor UI glitches that do not lead to security vulnerabilities or exploitation.

Smart Contracts and Blockchain

  • All smart contracts deployed on Moonbeam or Moonriver
  • Third-Party Oracle Data: Issues arising from incorrect data supplied by third-party oracles
  • Basic economic governance attacks (e.g. 51% attack)
  • Attacks relying on developers committing errors due to how Moonbeam’s EVM implementation differs from the standard EVM implementation
  • Liquidity Issues: Vulnerabilities or attacks that exploit a lack of liquidity.
  • Best Practice Critiques: Suggestions for improvements that do not address specific security vulnerabilities.
  • Sybil Attacks: Attacks involving the creation of multiple fake identities to gain disproportionate influence.
  • Centralization Risks: Risks associated with centralization that do not involve a specific vulnerability.
  • Any bugs or exploits in third party wallets

Websites and Apps

  • Theoretical Vulnerabilities: Issues without a working proof of concept or demonstration of impact.
  • Content Spoofing/Text Injection: Content spoofing or text injection issues that do not lead to further exploitation.
  • Self-XSS: Cross-Site Scripting attacks that require the victim to self-execute malicious code.
  • Captcha Bypass via OCR: Automated Captcha solving using Optical Character Recognition without direct security impact.
  • Non-Impactful CSRF: Cross-Site Request Forgery vulnerabilities that do not lead to significant security impact (e.g., logout CSRF, changing user preferences).
  • Missing Security Headers: Absence of HTTP security headers or cookie flags that do not lead to an exploitable vulnerability.
  • Server Information Disclosure: Disclosure of server information like IPs, server names, or stack traces that do not reveal sensitive data.
  • User Enumeration: Ability to enumerate or confirm the existence of users or tenants without further impact.
  • Unlikely User Actions: Vulnerabilities that require unrealistic or unlikely actions by the user.
  • Open Redirects: URL redirects unless they can be combined with another vulnerability to escalate the impact.
  • SSL/TLS Best Practices: Recommendations for SSL/TLS improvements without a direct security impact.
  • Low-Impact DDoS: Denial-of-Service vulnerabilities that do not cause significant disruption or financial loss.
  • Internal Privileged Access: Attacks requiring privileged access from within the organization.
  • Email SPF Records: Issues related to SPF, DKIM, or DMARC records for email domains without direct security impact.
  • Feature Requests: Suggestions for new features or enhancements.
  • Best Practice Suggestions: Recommendations for best practices without identifying specific vulnerabilities.
Default Out of Scope and rules

Blockchain/DLT specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers
Severity
Min. - Max.
Critical
$100k
High
$25k
Medium
$15k
Low
$2.5k
Total Assets in Scope
10
Total Impacts in Scope
33