Bao Finance
Submit a BugProgram Overview
Bao Finance is a new protocol that adds features to existing DeFi systems.
For more information about Bao Finance, please visit https://www.bao.finance/.
This bug bounty program is focused on their smart contracts and app and is focused on preventing:
- Loss of user funds staked (principal) by freezing or theft
 - Loss of governance funds
 - Theft of unclaimed yield
 - Freezing of unclaimed yield
 - Temporary freezing of funds for minimum 24 hours
 - Unable to call smart contract
 - Smart contract gas drainage
 
Rewards by Threat Level
Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System. This is a simplified 5-level scale, with separate scales for websites/apps and smart contracts/blockchains, encompassing everything from consequence of exploitation to privilege required to likelihood of a successful exploit.
All web/app bug reports must come with a PoC in order to be considered for a reward. All Medium, High, and Critical Smart Contract bug reports require a PoC and a suggestion for a fix to be eligible for a reward.
Payouts are handled by the Bao Finance team directly and are denominated in USD. However, payouts are done in RAI.
Smart Contracts and Blockchain
- Critical
 - Level
 - USD $100,000
 - Payout
 
- high
 - Level
 - USD $25,000
 - Payout
 
- medium
 - Level
 - USD $5,000
 - Payout
 
- low
 - Level
 - USD $1,000
 - Payout
 
Web and Apps
- Critical
 - Level
 - USD $15,000
 - Payout
 
Assets in Scope
All smart contracts of Bao Finance can be found at https://github.com/baofinance. However, only those in the Assets in Scope table are considered as in-scope of the bug bounty program.
Impacts in Scope
Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.
Smart Contracts/Blockchain
- Loss of user funds staked (principal) by freezing or theft
 - Loss of governance funds
 - Theft of unclaimed yield
 - Freezing of unclaimed yield
 - Temporary freezing of funds for minimum 24 hours
 - Unable to call smart contract
 - Smart contract gas drainage
 
Web/App
- Redirected funds by address modification
 - Users spoofing other users
 
- Smart Contract - Bao Token (ETH)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0xe0d0b1DBbCF3dd5CAc67edaf9243863Fd70745DA/transactions
 - Target
 - Smart Contract - Baocx Token (xDAI)
 - Type
 
- Smart Contract - PandaSwap Token (BSC)
 - Type
 
- Smart Contract - Polly Token (Polygon)
 - Type
 
- Smart Contract - BaoMasterFarmer (ETH)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0xf712a82DD8e2Ac923299193e9d6dAEda2d5a32fd/transactions
 - Target
 - Smart Contract - BaoMasterFarmer (xDAI)
 - Type
 
- Smart Contract - PandaSwapMasterFarmer (BSC)
 - Type
 
- Smart Contract - PollyMasterFarmer (Polygon)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0x45DE240fbE2077dd3e711299538A09854FAE9c9b/transactions
 - Target
 - Smart Contract - BaoSwap Factory (xDAI)
 - Type
 
- Smart Contract - PandaSwap Factory (BSC)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0x6093AeBAC87d62b1A5a4cEec91204e35020E38bE/transactions
 - Target
 - Smart Contract - BaoSwap Router (xDAI)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0xd83E87B585656573e6BC7A9A93776C76e479B8d6/transactions
 - Target
 - Smart Contract - Teahouse - tBao (xDAI)
 - Type
 
- Smart Contract - Bamboo Token (BSC)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0x7B993E0e3D4D02afBE42c65d3133CA8e9A70B102/transactions
 - Target
 - Smart Contract - Teamaker (xDAI)
 - Type
 
- Smart Contract - BambooMaker Staking Contract (BSC)
 - Type
 
- https://blockscout.com/xdai/mainnet/address/0x825b6a1548F8F019664b6Ae577b44bFb728435B0/transactions
 - Target
 - Smart Contract - Bao / Bao.cx 1:1 redemption (xDAI)
 - Type
 
- Smart Contract - Panda / Rhino 1:1 Swap (BSC)
 - Type
 
- Smart Contract - Rhino Token (BSC)
 - Type
 
- Smart Contract - Rhino Staking Contract (BSC)
 - Type
 
- Smart Contract - PieFactory (Polygon)
 - Type
 
- Smart Contract - Diamond (Polygon)
 - Type
 
- Smart Contract - DiamondCutFacet (Polygon)
 - Type
 
- Smart Contract - DiamondLoupFacet (Polygon)
 - Type
 
- Smart Contract - OwnershipFacet (Polygon)
 - Type
 
- Smart Contract - BasketFacet (Polygon)
 - Type
 
- Smart Contract - ERC20Facet (Polygon)
 - Type
 
- Smart Contract - CallFacet (Polygon)
 - Type
 
- Smart Contract - LendingRegestry (Polygon)
 - Type
 
- Smart Contract - PieRegistry (Polygon)
 - Type
 
- Smart Contract - Rebalancer (Polygon)
 - Type
 
- Smart Contract - AAVELendingLogic (Polygon)
 - Type
 
- Smart Contract - LendingManager (Polygon)
 - Type
 
- Smart Contract - CREAMLendingLogic (Polygon)
 - Type
 
- Smart Contract - Recipe (Polygon)
 - Type
 
- Smart Contract - Polly nDefi Nest (nDEFI) (Polygon)
 - Type
 
- Web/App - Website
 - Type
 
Prioritized Vulnerabilities
We are especially interested in receiving and rewarding vulnerabilities of the following types:
Smart Contracts and Blockchain
- Re-entrancy
 - Logic errors
- including user authentication errors
 
 - Solidity/EVM details not considered
- including integer over-/under-flow
 - including rounding errors
 - including unhandled exceptions
 
 - Trusting trust/dependency vulnerabilities
- including composability vulnerabilities
 
 - Oracle failure/manipulation
 - Novel governance attacks
 - Economic/financial attacks
- including flash loan attacks
 
 - Congestion and scalability
- including running out of gas
 - including block stuffing
 - including susceptibility to frontrunning
 
 - Consensus failures
 - Cryptography problems
- Signature malleability
 - Susceptibility to replay attacks
 - Weak randomness
 - Weak encryption
 
 - Susceptibility to block timestamp manipulation
 - Missing access controls / unprotected internal or debugging interfaces
 
Websites and Apps
- Remote Code Execution
 - Trusting trust/dependency vulnerabilities
 - Vertical Privilege Escalation
 - XML External Entities Injection
 - SQL Injection
 - LFI/RFI
 - Horizontal Privilege Escalation
 - Stored XSS
 - Reflective XSS with impact
 - CSRF with impact
 - Direct object reference
 - Internal SSRF
 - Session fixation
 - Insecure Deserialization
 - DOM XSS
 - SSL misconfigurations
 - SSL/TLS issues (weak crypto, improper setup)
 - URL redirect
 - Clickjacking (must be accompanied with PoC)
 - Misleading Unicode text (e.g. using right to left override characters)
 
Out of Scope & Rules
The following vulnerabilities are excluded from the rewards for this bug bounty program:
- Attacks that the reporter has already exploited themselves, leading to damage
 - Attacks requiring access to leaked keys/credentials
 - Attacks requiring access to privileged addresses (governance, strategist)
 
Smart Contracts and Blockchain
- Incorrect data supplied by third party oracles
- Not to exclude oracle manipulation/flash loan attacks
 
 - Basic economic governance attacks (e.g. 51% attack)
 - Lack of liquidity
 - Best practice critiques
 - Sybil attacks
 
Websites and Apps
- Theoretical vulnerabilities without any proof or demonstration
 - Content spoofing / Text injection issues
 - Self-XSS
 - Captcha bypass using OCR
 - CSRF with no security impact (logout CSRF, change language, etc.)
 - Missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”)
 - Server-side information disclosure such as IPs, server names, and most stack traces
 - Vulnerabilities used to enumerate or confirm the existence of users or tenants
 - Vulnerabilities requiring unlikely user actions
 - URL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)
 - Lack of SSL/TLS best practices
 - DDoS vulnerabilities
 - Attacks requiring privileged access from within the organization
 - Feature requests
 - Best practices
 
The following activities are prohibited by this bug bounty program:
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
 - Any testing with pricing oracles or third party smart contracts
 - Attempting phishing or other social engineering attacks against our employees and/or customers
 - Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
 - Any denial of service attacks
 - Automated testing of services that generates significant amounts of traffic
 - Public disclosure of an unpatched vulnerability in an embargoed bounty
 
