SushiSwap
SushiSwap is an automated market-making (AMM) decentralized exchange (DEX) that allows users to provide liquidity for token swaps.
PoC required
Codebase
Documentation
However, only the contracts listed in this table are considered as within the scope of the bug bounty program.
SushiXSwap contracts can be found here. Furo contracts can be found here. RouteProcesor contracts can be found here. Other contracts, outside of the ones mentioned here, might be considered on a case by case basis, as long as economic damage can be achieved.
Submission Requirements
In order to be considered for a reward, all bug reports must contain the following:
- Description of suspected vulnerability
- POC demonstrating the vulnerability for reproduction, can be a high-level POC
- Steps to reproduce the issue
- Your name and/or colleagues if you wish to be later recognized
- (Optional) A patch and/or suggestions to resolve the vulnerability
Ethical Behavior Requirements
Responsible disclosure is predicated on ethical behavior. These guidelines outline best practices for the community as whole, whether you are reporting, or the recipient of a report. By stating that you adhere to this policy, you’re claiming to handle vulnerability information ethically, and abide by the following:
- Do not attempt to leverage a vulnerability, or information of its existence as part of a financial trading strategy or otherwise for financial gain.
- Do not attempt to compromise systems upon which development of a product relies; including but not limited to compromising development systems, accounts, domains, email, etc..
- Do not attempt to sell vulnerability information or exploits.
- Do not ask for any form of compensation from an affected party. You may compensate a disclosing party if you would like to after all known vulnerability details have been disclosed.
- Do not disclose a bug or vulnerability on mailing lists, public boards, forums, social media or any other channel prior to Responsibly Disclosing to the organizations you have a published relationship with
- Do not attempt any illegal acts, including phishing, physical attacks, DDoS, or any attempt to gain access without authorization.
3rd Party Affected Projects
In the case where we become aware of security issues affecting other projects that have never affected SushiSwap, our intention is to inform those projects of security issues on a best effort basis.
In the case where we fix a security issue in SushiSwap that also affects the following neighboring projects, our intention is to engage in responsible disclosures with them as described in the adopted standard, subject to the deviations described in the deviations section below.
Deviations from the Standard
In the case of a counterfeiting or fund-stealing bug affecting SushiSwap, however, we might decide not to include those details with our reports to partners ahead of coordinated release, as long as we are sure that they are not vulnerable.
Notes on Expected Behaviors
- Any unaccounted ETH or ERC20 in the BentoBox can be skimmed.
- Any reports that involve tokens outside of ERC20s will not be considered in scope. (i.e. ERC777 tokens)