dHEDGE
Submit a BugProgram Overview
dHEDGE is a one-stop location for managing investment activities on the blockchain where you can put your capital to work in different strategies based on a transparent track record. Multi-chain, non-custodial, decentralized asset management integrated with multiple protocols; allowing for trades, providing liquidity and yield farming.
For more information about dHEDGE, please visit https://app.dhedge.org/.
This bug bounty program is focused on their smart contracts and is focused on preventing:
- Loss of user funds staked (principal) by freezing or theft
 - Loss of governance funds
 - Theft of unclaimed yield
 - Freezing of unclaimed yield
 - Temporary freezing of funds for any amount of time
 - Unable to call smart contract
 - Smart contract gas drainage
 - Smart contract fails to deliver promised returns
 - Deposit and withdrawal bugs
 - Arbitrage bugs
 - Protocol integration bugs
 
Rewards by Threat Level
Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System. This is a simplified 5-level scale, with separate scales for websites/apps and smart contracts/blockchains, encompassing everything from consequence of exploitation to privilege required to likelihood of a successful exploit.
There is one exception for this bug bounty program, which overrides one vulnerability in the vulnerability scale, in the above Immunefi Vulnerability Severity Classification System:
- The vulnerability of: “Token holders temporarily unable to transfer holdings” will be classified under this bug bounty program as a medium vulnerability.
 
Vulnerabilities marked as “Acknowledged” in the https://www.certik.org/projects/dhedge are not eligible for a reward.
Payouts are handled by the dHEDGE team directly and are denominated in USD. However, payouts are done in USDC.
Smart Contracts and Blockchain
- Critical
 - Level
 - USD $50,000
 - Payout
 
- high
 - Level
 - USD $10,000
 - Payout
 
- medium
 - Level
 - USD $5,000
 - Payout
 
- low
 - Level
 - USD $1,000
 - Payout
 
Assets in Scope
All smart contracts of dHEDGE can be found at https://github.com/dhedge/V2-Public and https://github.com/dhedge/V2-Public/tree/production. However, only those in the Assets in Scope table are considered as in-scope of the bug bounty program.
Impacts in Scope
Only the following impacts are accepted within this bug bounty program. All other impacts are not considered as in-scope, even if they affect something in the assets in scope table.
Smart Contracts/Blockchain
- Loss of user funds staked (principal) by freezing or theft
 - Loss of governance funds
 - Theft of unclaimed yield
 - Freezing of unclaimed yield
 - Temporary freezing of funds for any amount of time
 - Unable to call smart contract
 - Smart contract gas drainage
 - Smart contract fails to deliver promised returns
 - Deposit and withdrawal bugs
 - Arbitrage bugs
 - Protocol integration bugs
 
- Smart Contract - Governance
 - Type
 
- Smart Contract - Pool Factory Proxy
 - Type
 
- Smart Contract - Pool Factory
 - Type
 
- Smart Contract - Pool Logic
 - Type
 
- Smart Contract - Pool Manager Logic
 - Type
 
- Smart Contract - Asset Handler
 - Type
 
- Smart Contract - ERC20 Guard
 - Type
 
- Smart Contract - Aave Lending Pool Asset Guard
 - Type
 
- Smart Contract - Balancer V2 Guard
 - Type
 
- Smart Contract - dUSD aggregator
 - Type
 
Prioritized Vulnerabilities
We are especially interested in receiving and rewarding vulnerabilities of the following types:
Smart Contracts and Blockchain
- Re-entrancy
 - Logic errors
- including user authentication errors
 
 - Solidity/EVM details not considered
- including integer over-/under-flow
 - including rounding errors
 - including unhandled exceptions
 
 - Trusting trust/dependency vulnerabilities
- including composability vulnerabilities
 
 - Oracle failure/manipulation
 - Novel governance attacks
 - Economic/financial attacks
- including flash loan attacks
 
 - Congestion and scalability
- including running out of gas
 - including block stuffing
 - including susceptibility to frontrunning
 
 - Consensus failures
 - Cryptography problems
- Signature malleability
 - Susceptibility to replay attacks
 - Weak randomness
 - Weak encryption
 
 - Susceptibility to block timestamp manipulation
 - Missing access controls / unprotected internal or debugging interfaces
 
Out of Scope & Rules
The following vulnerabilities are excluded from the rewards for this bug bounty program:
- Attacks that the reporter has already exploited themselves, leading to damage
 - Attacks requiring access to leaked keys/credentials
 - Attacks requiring access to privileged addresses (governance, strategist)
 
Smart Contracts and Blockchain
- Incorrect data supplied by third party oracles
- Not to exclude oracle manipulation/flash loan attacks
 
 - Basic economic governance attacks (e.g. 51% attack)
 - Lack of liquidity
 - Best practice critiques
 - Sybil attacks
 
The following activities are prohibited by this bug bounty program:
- Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
 - Any testing with pricing oracles or third party smart contracts
 - Attempting phishing or other social engineering attacks against our employees and/or customers
 - Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
 - Any denial of service attacks
 - Automated testing of services that generates significant amounts of traffic
 - Public disclosure of an unpatched vulnerability in an embargoed bounty
 
