Outcome
  • Outcome
  • KPI Options
    • What are KPI Options?
    • Designing your own KPI options program
    • KPI Option Configuration
      • Common Ancillary Data Parameters
      • DefiLlama TVL
      • Subgraph Query
      • Metric Operations
    • Supported Payout Functions
    • Deployment Tutorial
    • Examples
  • Success Tokens
    • What are Success Tokens?
    • Deployment Tutorial
    • Examples
  • Optimistic Governance
    • What is the Optimistic Governor?
  • Other Outcome Products
    • Other Outcome Products
  • Resources
    • LSP Prerequisites
    • Network Addresses
    • Audit & Bug Bounty Programs
    • Glossary
    • Links
Powered by GitBook
On this page
  • Audits
  • Bug Bounty Rewards
  • Hats Vault
  • Scope
  • Submissions
  • Terms & Conditions
  1. Resources

Audit & Bug Bounty Programs

PreviousNetwork AddressesNextGlossary

Last updated 2 years ago

Security of the platform is our highest priority. All contract code and balances are publicly verifiable, and security researchers are eligible for a bug bounty for reporting undiscovered vulnerabilities.

Audits

OpenZeppelin has performed the following audits on UMA contracts:

Additionally, OpenZeppelin audits incremental upgrades to UMA's contracts on a continuous basis. The continuous audit report can be found .

Bug Bounty Rewards

UMA encourages the community to audit our contracts and security; we also encourage the responsible disclosure of any issues. The bug bounty program is intended to recognize the value of working with the community of independent security researchers and sets out our definition of good faith in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

UMA offers substantial rewards for discoveries that can prevent the loss of assets, the freezing of assets, or harm to users.

All rewards will be paid in $UMA, and the amount of compensation will vary depending on bug severity. Reward amounts typically correspond to severity in the following manner.

Severity
Reward amount in USD

Low

$250

Medium

$3,000

High

$10,000

Critical

10% of funds at risk

Hats Vault

Note that only smart contract vulnerabilities are eligible for rewards from the Hats vault. Any vulnerability or bug reports not related to UMA or Across Protocol smart contracts, such as front-end or hosting configuration issues, will not receive rewards.

Scope

The scope of our bug bounty program includes any and all of UMA's production smart contracts. It does not include known issues with the intended behavior.

In scope:

    • Note: this does not include smart contracts that have not been deployed in a production capacity (test deployments for instance).

Examples of what’s in scope:

  • Being able to steal funds

  • Being able to freeze funds or render them inaccessible by their owners

Out of scope:

  • Issues that have already been submitted by another user or are already known to the UMA team

    • Note: this includes bugs known to the UMA team, but have not been disclosed due to active mitigation efforts.

  • Vulnerabilities in contracts built on top of the protocol by third-party developers (such as smart contract wallets)

  • Vulnerabilities that require ownership of an admin key

  • Any files, modules or libraries other than the ones mentioned above

  • More efficient gas solutions

  • Any points listed as an already known weaknesses

  • Any points listed in an audit report

Submissions

The submission must include clear and concise steps to reproduce the discovered vulnerability.

Terms & Conditions

If you comply with the policies below when reporting a security issue to us, we will not initiate a lawsuit or law enforcement investigation against you in response to your report.

We ask that you:

  • Report any vulnerability you’ve discovered promptly.

  • Avoid violating the privacy of others, disrupting our systems, destroying data, or harming user experience.

  • Keep the details of any discovered vulnerabilities confidential until they are publicly announced by Risk Labs.

  • Perform testing only on in-scope systems, and respect systems and activities which are out-of-scope.

  • Not engage in blackmail, extortion, or any other unlawful conduct.

  • Not be a current or former UMA Foundation employee, vendor, contractor, or the employee of an UMA vendor or contractor.

All reward determinations, including eligibility and payment amount, are made at UMA’s sole discretion. UMA reserves the right to reject submissions and alter the terms and conditions of this program without notice.

Severity is calculated according to the risk rating model based on Impact and Likelihood.

UMA offers additional rewards through , which pay out for reports of smart contract vulnerabilities based on severity. Whitehat hackers are encouraged to submit smart contract vulnerabilities through Hats.finance in addition to e-mailing to claim these rewards.

All UMA smart contracts that are deployed to mainnet: .

Bot code to support actively deployed smart contracts: .

Please email your submissions to .

Use only to discuss vulnerabilities with us.

Public disclosure of the bug or the indication of an intention to exploit it on Mainnet will make the report ineligible for a bounty. If in doubt about other aspects of the bounty, most of the will apply.

Any questions? Reach us via email (). For more information on the UMA platform, check out our and .

Common and oracle directory contracts: April 28, 2020
Financial-templates directory contracts: May 12, 2020
Updates to the Expiring Multiparty contracts and flash loan mitigations for the voting contracts: September 9, 2020
Perpetual Multiparty template contracts: February 2, 2021
Insured Bridge contracts: December 1, 2021
Governance, cross-chain oracle, and optimistic rewarder contracts: January 7, 2022
UMA Optimistic Governor Audit: July 21, 2022
Across Token and Token Distributor Audit: July 21, 2022
here
OWASP
Hats.finance
UMA-backed protected tokens
[email protected]
link
link
[email protected]
[email protected]
Ethereum Foundation bug bounty program rules
[email protected]
website
Github