bug-bounty

623 articles
Sort: New Top Best
clear filter
0
O3
vulnerability

O3 bridge aggregators are vulnerable to token theft through callproxy parameter manipulation in exactInputSinglePToken(), allowing attackers to impersonate approved users and steal their funds when they've approved the aggregator with non-MAX amounts. The vulnerability affects all O3 aggregators across 10+ chains, though the team disputed the severity citing their frontend's default MAX approval behavior.

O3 O3EthereumUniswapV3Aggregator 0x561f712b4659be27efa68043541876a137da532b 0xC11073e2F3EC407a44b1Cff9D5962e6763F71187 0xdAC17F958D2ee523a2206206994597C13D831ec7 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 0x1337133713371337133713371337133713371337 0xDjango Immunefi Uniswap V3
trust-security.xyz · Trust · 5 hours ago · details
0
postmortem

Story Network's postmortem analysis reveals two critical vulnerabilities discovered during mainnet launch. The first issue allowed attackers to create arbitrarily large EVM transaction payloads (>4MB) that would cause validator crashes and network shutdown through JSON marshalling inefficiencies and inadequate block size validation inherited from Octane codebase.

Story Network Story Foundation Cantina Octane Omni Geth CometBFT
story.foundation · WhiteHatMage · 5 hours ago · details
0
bug-bounty
kalos.xyz · Jade · 5 hours ago · details
0
bug-bounty

A security researcher earned $10,000 on Immunefi by discovering two related vulnerabilities in DFX Finance: unhandled fee-on-transfer (FoT) tokens that drain liquidity from USDC pairs, and risks from USDC being upgradable, which could introduce breaking changes to the protocol. The submission succeeded through a functional proof-of-concept, real-world impact examples, and actionable remediation recommendations.

DFX Finance Beirao Code4Arena Immunefi Trail of Bits USDC EURT GYEN PAXG USDT Uniswap SEC
beirao.xyz · Beirao · 5 hours ago · details
0
bug-bounty
twitter.com · kankodu · 5 hours ago · details
0
bug-bounty
x.com · Pavel Shabarkin · 5 hours ago · details
0
bug-bounty
twitter.com · HollaWaldfee · 5 hours ago · details
0
bug-bounty
twitter.com · guhu · 5 hours ago · details
0
bug-bounty
twitter.com · iczc · 5 hours ago · details
0
bug-bounty
twitter.com · Daniel Cohen Hillel · 5 hours ago · details
0
vulnerability

A critical vulnerability in the Betverse ICO Token contract's transferTokenToLockedAddresses() function was caused by incorrectly marking it as public instead of internal, allowing attackers to steal BToken by repeatedly transferring funds to their addresses. The article documents this access control misconfiguration discovered during security research on the Immunefi platform.

Betverse Immunefi BToken Shanmuga Bharathi Ocean Protocol OASYS
mirror.xyz · Shanmuga Bharathi. N · 5 hours ago · details
0
-
vulnerability

Discussion of a business logic vulnerability in ad portals that allows running advertisements for free on major platforms like Reddit, Twitter, and Quora. While not directly compromising app security or user data, the vulnerability causes financial damage to companies through unauthorized ad budget bypass.

Reddit Twitter Quora Adam
mirror.xyz · Driver · 5 hours ago · details
0
bug-report

Security research analyzing a hybrid NFT vulnerability in Ocean Protocol where on-chain Data Description Objects (DDOs) stored on blockchain can be modified to enable attacks. The article discusses design flaws and issues discovered in Ocean Protocol's implementation, with bug bounty disclosures via Immunefi.

Ocean Protocol Immunefi Merkle Bonsai Oasys Eco Bandai Namco DoubleJump.japan
mirror.xyz · merkle_bonsai · 5 hours ago · details
0
bug-bounty

A collection of security research articles covering vulnerabilities in blockchain projects including Oasys (a gaming-focused Ethereum L2), Eco's lockup contracts, and Ocean Protocol's hybrid NFT implementation where on-chain data modifications can be exploited. Multiple bugs are documented with disclosure timelines and remediation details.

Oasys Merkle Bonsai Immunefi Bandai Namco DoubleJump.japan Eco Ocean Protocol
mirror.xyz · merkle_bonsai · 5 hours ago · details
0
bug-bounty
medium.com · Tommaso Pifferi · 5 hours ago · details
0
bug-bounty
medium.com · Lucash-dev · 5 hours ago · details
0
bug-bounty
medium.com · LonelySloth · 5 hours ago · details
0
bug-bounty
medium.com · Catchme · 5 hours ago · details
0
bug-bounty
medium.com · unknown · 5 hours ago · details
0
bug-bounty
medium.com · GregadETH · 5 hours ago · details
0
bug-bounty
medium.com · Paludo0x · 5 hours ago · details
0
bug-bounty
medium.com · csanuragjain · 5 hours ago · details
0
opinion

A critique of bug bounty program practices, contrasting good practices (fair and timely payments) with bad practices (ignoring disclosures, delayed payments, underpaid bounties) in the context of DeFi protocol security.

Balancer riptide
mirror.xyz · riptide · 5 hours ago · details
0
Eco
bug-bounty

A collection of blockchain security research and bug reports covering vulnerabilities in Oasys L2 blockchain, Eco's lockup contracts, and hybrid NFT attacks on Ocean Protocol. Multiple issues were identified and reported through Immunefi's bug bounty program.

Oasys Ethereum Immunefi Bandai Namco DoubleJump.japan Eco Ocean Protocol Merkle Bonsai
mirror.xyz · merkle_bonsai · 5 hours ago · details
0 2/10
bug-bounty

Portfolio page showcasing multiple critical smart contract vulnerabilities disclosed across DeFi/NFT protocols, including access control flaws, uninitialized UUPS proxies enabling arbitrary delegatecalls, and broken token transfer functions. Author details bounty payouts and rescued funds across 88mph, Polygon, KeeperDAO, and other projects, with limited technical depth on each vulnerability.

pxMythics 88mph Polygon KeeperDAO Rivermen NFT OpenZeppelin abwagmi AxonsToken Alchemix Ondo Finance Code 4rena Immunefi iosiro Damn Vulnerable DeFi Decently Safe DeFi yAcademy Curve Finance BSides Cape Town Dedaub Ashiq Amien
ashiq.co.za · Ashiq Amien · 5 hours ago · details
0
bug-bounty
medium.com · satya0x · 5 hours ago · details
0
bug-bounty

A bug discovered in Fluidity's reward distribution system where improper state management in reward function ordering could enable double-claiming of rewards across different batch and manual reward invocations. The vulnerability stems from insufficient tracking of reward claims when multiple batchReward() and manualReward() transactions execute out of order in the mempool.

Fluidity fUSDC AAVE Compound Token.sol WorkerConfig.sol CompoundLiquidityProvider.sol AaveV3LiquidityProvider.sol
trust-security.xyz · Trust · 5 hours ago · details
0
Fei
bug-bounty
medium.com · Bobface · 5 hours ago · details
0
bug-bounty
medium.com · saurik · 5 hours ago · details
0
bug-bounty
medium.com · alephv.eth · 5 hours ago · details
More