Bounty Vaults

Find vulnerabilities in registered Solana programs. Get paid in SOL.

How Bounties Work

1. Find a Bug

Audit any registered program's on-chain code. Look for access control flaws, integer overflows, PDA validation issues, or logic bugs.

2. Submit Proof

Submit an encrypted disclosure with a hash commitment. The protocol gets a grace period to acknowledge, fix, and resolve.

3. Get Paid

Once resolved, claim your bounty automatically from the vault. Payout is based on severity. All on-chain, no middlemen.

Severity Levels

Low

Informational issues, minor logic errors, gas optimizations, missing events

Medium

State corruption under edge cases, missing validation on non-critical paths, griefing vectors

High

Bypassing access control, manipulating protocol logic, unauthorized state changes

Critical

Direct fund theft, permanent fund lock, complete protocol takeover

Loading bounty vaults...