Omron-logo

Omron

|

Subnet 2, the next stage in cryptographically verified efficient and intelligent networks. By leveraging incentive design, Subnet 2 optimizes the generation of zero knowledge and verified compute across verticals such as zkML, zkRollups, training, model distillation and much more.

Infrastructure
Zero-Knowledge Proofs
Maximum Bounty
$15,000
Live Since
30 September 2024
Last Updated
14 November 2025
  • PoC Required

  • KYC required

  • Arbitration enabled

Assets in Scope

No results found.

Please adjust your search.

Impacts in Scope

Impacts Body

Only the following impacts are accepted within the Program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.

Severity
Critical
Title

Retrieve sensitive data/files from a running server, such as: /etc/shadow database passwords blockchain keys (this does not include non-sensitive environment variables, open source code, or usernames)

Severity
Critical
Title

Taking state-modifying authenticated actions (with or without blockchain state interaction) on behalf of other users without any interaction by that user, such as: Changing registration information Commenting Voting Making trades Withdrawals, etc.

Severity
Critical
Title

Generating a false ZK proof that the verify algorithm deems as correct (breaking protocol soundness) leading to loss of funds

Severity
Critical
Title

Execute arbitrary system commands

Severity
Critical
Title

Taking down the application/website

Severity
Critical
Title

Subdomain takeover with already-connected wallet interaction

Severity
Critical
Title

Direct theft of user funds

Severity
Critical
Title

Injection of malicious HTML or XSS through metadata

Severity
High
Title

Injecting/modifying the static content on the target application without JavaScript (persistent), such as: HTML injection without JavaScript Replacing existing text with arbitrary text Arbitrary file uploads, etc

Severity
High
Title

Changing sensitive details of other users (including modifying browser local storage) without already-connected wallet interaction and with up to one click of user interaction, such as: Email Password of the victim etc.

Severity
High
Title

Improperly disclosing confidential user information, such as: Email address Phone number Physical address, etc.

Severity
High
Title

Subdomain takeover without already-connected wallet interaction