Threshold Network-logo

Threshold Network

Threshold Network powers tBTC, the Bitcoin standard in finance and the most decentralized 1:1 tokenized BTC, enabling Bitcoin liquidity to flow seamlessly across chains without compromising on settlement finality. Built on threshold cryptography and secured by a rotating network of independent node operators, tBTC distributes control of BTC so that no single entity can act unilaterally on funds. This architecture embodies Bitcoin’s core values : trust-minimized, permissionless, and censorship-resistant, while maintaining a direct settlement path back to native Bitcoin. By bridging BTC into DeFi through a system designed to favor math over trust, tBTC establishes the foundation for secure, decentralized Bitcoin utility across multiple ecosystems. This infrastructure enables tBTC to power lending, trading, and yield across major DeFi networks.

Arbitrum
ETH
Optimism
Polygon
Solana
Base
Starknet
SUI
Blockchain
Defi
Crosschain Liquidity
Currency
Staking
Synthetic Assets
JavaScript
Solidity
Maximum Bounty
$500,000
Live Since
28 April 2023
Last Updated
27 November 2025
  • PoC Required

Select the category you'd like to explore

Assets in Scope

Target
Name
threshold network website
Added on
27 November 2025
Name
Bank
Added on
28 April 2023
Name
VendingMachine (NU -> T)
Added on
28 April 2023
Target
Name
tBTC v2 Polygon gateway contract
Added on
21 June 2023
Name
L1 bridge address(Starknet)
Added on
17 July 2025
Name
WalletRegistry
Added on
28 April 2023
Target
Name
L2 bridge address (Starknet)
Added on
17 July 2025
Target
Name
tBTC v2 Optimism gateway contract
Added on
21 June 2023
Target
Name
L2BTCRedeemerProxy
Added on
20 October 2025
Target
Name
tBTC v2 token on Polygon
Added on
21 June 2023
Name
LightRelay
Added on
28 April 2023
Target
Name
tBTC v2 Arbitrum gateway contract
Added on
21 June 2023

Impacts in Scope

Severity
Critical
Title

Manipulation of governance voting result deviating from voted outcome and resulting in a direct change from intended effect of original results

Severity
Critical
Title

Direct theft of any user funds, whether at-rest or in-motion, other than unclaimed yield

Severity
Critical
Title

Permanent freezing of funds

Severity
Critical
Title

Protocol insolvency

Severity
Critical
Title

Execute arbitrary system commands

Severity
Critical
Title

Retrieve sensitive data/files from a running server such as: database passwords, blockchain keys, etc (this does not include non-sensitive environment variables, open source code, or usernames)

Severity
Critical
Title

Taking state-modifying authenticated actions (with or without blockchain state interaction) on behalf of other users without any interaction by that user, such as: Changing registration information, Commenting, Voting, Making trades, Withdrawals, etc.

Severity
Critical
Title

Subdomain takeover with already-connected wallet interaction

Severity
Critical
Title

Direct theft of user funds

Severity
Critical
Title

Malicious interactions with an already-connected wallet such as: Modifying transaction arguments or parameters, Substituting contract addresses, Submitting malicious transactions

Severity
High
Title

Theft of unclaimed yield

Severity
High
Title

Permanent freezing of unclaimed yield

Out of scope

Program's Out of Scope information
  • Attacks that interact with either KEEP or NU legacy contracts
    • Vulnerabilities requiring unlikely user actions
Default Out of Scope and rules

Web & App specific

  • Theoretical impacts without any proof or demonstration
  • Impacts involving attacks requiring physical access to the victim device
  • Impacts involving attacks requiring access to the local network of the victim
  • Reflected plain text injection (e.g. url parameters, path, etc.)
    • This does not exclude reflected HTML injection with or without JavaScript
    • This does not exclude persistent plain text injection
  • Any impacts involving self-XSS
  • Captcha bypass using OCR without impact demonstration
  • CSRF with no state modifying security impact (e.g. logout CSRF)
  • Impacts related to missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”) without demonstration of impact
  • Server-side non-confidential information disclosure, such as IPs, server names, and most stack traces
  • Impacts causing only the enumeration or confirmation of the existence of users or tenants
  • Impacts caused by vulnerabilities requiring un-prompted, in-app user actions that are not part of the normal app workflows
  • Lack of SSL/TLS best practices
  • Impacts that only require DDoS
  • UX and UI impacts that do not materially disrupt use of the platform
  • Impacts primarily caused by browser/plugin defects
  • Leakage of non sensitive API keys (e.g. Etherscan, Infura, Alchemy, etc.)
  • Any vulnerability exploit requiring browser bugs for exploitation (e.g. CSP bypass)
  • SPF/DMARC misconfigured records)
  • Missing HTTP Headers without demonstrated impact
  • Automated scanner reports without demonstrated impact
  • UI/UX best practice recommendations
  • Non-future-proof NFT rendering

All categories

  • Impacts requiring attacks that the reporter has already exploited themselves, leading to damage
  • Impacts caused by attacks requiring access to leaked keys/credentials
  • Impacts caused by attacks requiring access to privileged addresses (including, but not limited to: governance and strategist contracts) without additional modifications to the privileges attributed
  • Impacts relying on attacks involving the depegging of an external stablecoin where the attacker does not directly cause the depegging due to a bug in code
  • Mentions of secrets, access tokens, API keys, private keys, etc. in Github will be considered out of scope without proof that they are in-use in production
  • Best practice recommendations
  • Feature requests
  • Impacts on test files and configuration files unless stated otherwise in the bug bounty program
  • Impacts requiring phishing or other social engineering attacks against project's employees and/or customers