WhiteSwap offers a bug bounty for software engineers who can help improve WhiteSwap’s code. If you discover a bug, we appreciate your cooperation in responsibly investigating and reporting it to us so we can address it as soon as possible.
This program is limited to the vulnerabilities affecting WhiteSwap in the following contracts:
- Factory 0x69bd16aE6F507bd3Fc9eCC984d50b04F029EF677
- Factory Logic 0xfbacbc64e684c0c5bf572fc6d42458c3e3fd1d1d
- Pair Logic 0x524818CB8081941B618613c6F990C17Bb3DA0866
- Router Logic 0x79e036400de16cEF7aA543470F6749a5203e8A76
- Router 0x981B14110cE9bf3FC88595227d51699b0A1448D0
- Controller 0xA9229c9D3720CD359cEc51A259003C845E4C8224
- Governance 0x5a2b018352a1bd9831de2cbe5e8f24333bccbb8b
- Governance 0xD39Fc1cC607FB2f22be6602b7C5F21C451e65e27
- Treasure 0x549a5Cf3557D92a8B0fAD549499Eba4d41836c10
- Liquidity Mining Rewards 0x3ee6A551C19F437d40cc4959809D9d7DfA6c5Ee9
- Liquidity Mining Rewards Factory 0xbA57C666Ee6295EEb69a1F1747b2efAD49404fba
- Liquidity Mining Factory Proxy 0xAaD743d6B4e089141907622D8a760eb46C43De4E
- Implementation Getter 0xf43534Be33Ddbf4261F730802DD2e83502c8f30a
- Token List Payment 0xFc14A3917B7338E94BA14eF8df85CB18692D9aa6
- Bridge to Polygon (FxERC20RootTunnel) 0x5e1deC6C0Dd751d477e9F424DeaE3E429F0716b1
- Factory 0x8D232a26173DBA87E672FE4a9103ee0A3b98c165
- Factory Logic 0xF2757464f7Ec02072D60cccf6E06e0C75185946F
- Pair Logic 0x347024394cD74Cf01c166ce43679FB3de2818514
- Router Logic 0xd9eEc593aD7551fd992967865C987EF6B4B0DB33
- Router 0x702b91b0efd70D4170c0a76A0278298f7d72e8Af
- Controller 0xb847ff93Df714F459287821586a14fe339A6d44e
- Governance 0xF8b3424De2514EaC11dC27f342579AbefDDCe94c
- Governance 0xFB2891CdFB06EEda2DbE84B5F45108851De6B266
- Treasure 0x2782a91092aA91c9ED9e8AD89140d2e5680ea914
- Liquidity Mining Rewards 0xF39a5203F41Ce8D5064B2C133468Ee5DfB7B2321
- Liquidity Mining Rewards Factory 0x433015848078d1a31a6fd2E0Eef3dE1E07e9E26E
- Liquidity Mining Factory Proxy 0x737245aC180e309489978D0C4AAd6B8B876311FB
- Implementation Getter 0x53B92b72b57C56b2C3CEB8AbDCc28282f9eaa085
- Bridge to Ethereum (FxERC20ChildTunnel) 0x8eB0292c8d21375cFBa3bf0534732C210714d73C
- Factory 0x5e52aaCc9745E226C157E33A2dcd442f2F63f413
- Factory Logic 0xe959646E9b7F61F37eAa18F2989B7eF726D4fB5A
- Pair Logic 0xB088627E461b758E71Ae6b44a0Fef4177338FDe7
- Router Logic 0xef59cAf3851a6721179e49dB7123ed9516f367d9
- Router 0xCc7C3408437e7A2698de5350A4a6dC845F3354fe
- Controller 0xE39E00ab80A284E7B61808B15b1C676D00f2430f
- Governance 0xd9eEc593aD7551fd992967865C987EF6B4B0DB33
- Governance 0xe0041f937BD406fCF92cFAD60ddf570504dE2Fae
- Treasure 0x7A85DAc2e392B20d2F85a3B68Eaf5Bf56e5eD854
- Liquidity Mining Rewards 0x064d5d43F261EAb47528Bf9F05e3C55f7e5b978c
- Liquidity Mining Rewards Factory 0x8eB0292c8d21375cFBa3bf0534732C210714d73C
- Liquidity Mining Factory Proxy 0xE66F7bf04F9540641BCb34c6E01f012858a0d15E
- Implementation Getter 0x9B7A13dA9BCdd08996F6588089AAED34d47d7C0B
- Bridge to Ethereum (ERC20BridgeNonNativeChain) 0x3D2F250bc3b80cdD63A28c9Ef5cDa3cfcB74e9C1
- Router TEx8NGKMLTHFWYWEMKAZbJbdcaLdDGyLD4
- Factory TZENwkSudHRjeufNrQYAPtCmcuNRw2HNYT
- Burn Token TGtNRvEkQPobTM5A22eAxDSTtLkpiiP9Mo
- Value Aggregator TTyiD8XFdzGg1pgfLgRVKHFNqodCpLhNEn
The following bugs are not within the scope of the program:
- bugs in any third-party contract or platform that interacts with WhiteSwap;
- vulnerabilities already reported and/or discovered in contracts built by third parties on WhiteSwap;
- any already-reported bugs.
Vulnerabilities contingent upon the occurrence of any of the following activities also are outside the scope of this program:
- front-end bugs;
- DDOS attack;
- spamming;
- automated tools;
- compromising or misusing third-party systems or services.
Program Rewards
A $5,000 initial bounty pool is available, which will be followed by an additional pool of WSD governance tokens. Rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability.
Disclosure
Any vulnerability or bug discovered must be reported only to the following email: [email protected]; must not be disclosed publicly; must not be disclosed to any other person, entity, or email address prior to disclosure to the [email protected]; and must not be disclosed in any way other than to the [email protected] email. In addition, disclosure to [email protected] must be made promptly following the discovery of the vulnerability. Please include as much information about the vulnerability as possible:
- the conditions on which reproducing the bug is contingent;
- the steps needed to reproduce the bug or, preferably, a proof of concept;
- the potential implications of the vulnerability being abused.
A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount. Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution if agreed.
Eligibility
To be eligible for a reward under this program, you must:
- discover a previously unreported, non-public vulnerability that would result in a loss of or a lock on any ERC-20 token on WhiteSwap (but not on any third-party platform interacting with WhiteSwap), and that is within the scope of this program;
- be the first to disclose the unique vulnerability to [email protected] in compliance with the disclosure requirements above;
- provide sufficient information to enable our engineers to reproduce and fix the vulnerability;
- not engage in any unlawful conduct when disclosing the bug to [email protected], including through threats, demands, or any other coercive tactics;
- not exploit the vulnerability in any way, including through making it public or by obtaining a profit (other than a reward under this program);
- make a good faith effort to avoid privacy violations, destruction of data, interruption, or degradation of WhiteSwap;
- submit only one vulnerability per submission unless you need to chain vulnerabilities to provide impact regarding any of the vulnerabilities;
- not submit a vulnerability caused by an underlying issue that is the same as an issue on which a reward has been paid under this program;
- be at least 18 years of age;
- not be one of our current or former employees, vendors, or contractors or an employee of any of those vendors or contractors;
- comply with all the eligibility requirements of the program.
Other Terms
All reward decisions, including eligibility for and amounts of the rewards and the manner in which such rewards will be paid, are made at our sole discretion. The terms and conditions of this program may be altered at any time.