SORA-logo

SORA

The SORA community envisions a new economic world order — one that is truly decentralized and democratic. SORA is building to deliver financial inclusion for all without discrimination and provide a better method to manage day-to-day finances.

Kusama
Polkadot
Blockchain
Exchange
DEX
L2
Rust
Typescript
Maximum Bounty
$30,000
Live Since
07 July 2022
Last Updated
08 November 2024
  • PoC required

Select the category you'd like to explore

Assets in Scope

Target
Type
Blockchain/DLT - Blockchain/DLT
Added on
7 July 2022
Target
Type
Websites and Applications - Web/App
Added on
7 July 2022
Target
Type
Websites and Applications - Web/App (applicable to latest release tag)
Added on
7 July 2022

Impacts in Scope

Severity
Critical
Title

Direct loss of funds

Severity
Critical
Title

Permanent freezing of funds (fix requires hardfork)

Severity
Critical
Title

Subdomain takeover with already-connected wallet interaction

Severity
Critical
Title

Direct theft of user funds

Severity
Critical
Title

Malicious interactions with an already-connected wallet, such as modifying transaction arguments or parameters, substituting contract addresses, submitting malicious transactions, etc.

Out of scope

Program's Out of Scope information
  • Best practice critiques
  • Issues related to the frontend without concrete impact and PoC
  • Best practices issues without concrete impact and PoC

Known issues here are out of scope for this program https://github.com/sora-xor/sora2-evm-contracts/commit/1e13152b7f7cf25abf8f6d44837bcd891a736b94/

Default Out of Scope and rules

Blockchain/DLT specific

  • Incorrect data supplied by third party oracles
    • Not to exclude oracle manipulation/flash loan attacks
  • Impacts requiring basic economic and governance attacks (e.g. 51% attack)
  • Lack of liquidity impacts
  • Impacts from Sybil attacks
  • Impacts involving centralization risks

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers