Bounty Vaults
Find vulnerabilities in registered Solana programs. Get paid in SOL.
How Bounties Work
1. Find a Bug
Audit any registered program's on-chain code. Look for access control flaws, integer overflows, PDA validation issues, or logic bugs.
2. Submit Proof
Submit an encrypted disclosure with a hash commitment. The protocol gets a grace period to acknowledge, fix, and resolve.
3. Get Paid
Once resolved, claim your bounty automatically from the vault. Payout is based on severity. All on-chain, no middlemen.
Severity Levels
Low
Informational issues, minor logic errors, gas optimizations, missing events
Medium
State corruption under edge cases, missing validation on non-critical paths, griefing vectors
High
Bypassing access control, manipulating protocol logic, unauthorized state changes
Critical
Direct fund theft, permanent fund lock, complete protocol takeover
Loading bounty vaults...