Skip to main content

Program status

A formal bug bounty program with tiered rewards is being finalized. In the meantime, please report any security issues directly to us.

How to report

If you discover a potential vulnerability: Email: security@varla.xyz What to include:
  • Description of the issue
  • Steps to reproduce
  • Potential impact assessment
  • Your wallet address (for bounty payment when program launches)

Responsible disclosure

We ask that you:
  1. Do not exploit any vulnerabilities on mainnet
  2. Do not publicly disclose the issue until we’ve had time to address it
  3. Do give us reasonable time to respond (typically 48 hours for initial acknowledgment)
  4. Do work with us to understand and resolve the issue

Scope (preview)

When the formal program launches, we expect the following to be in scope:
In scopeOut of scope
VarlaCoreTest/mock contracts
VarlaPoolThird-party dependencies
VarlaOracleFrontend/UI issues
VarlaLiquidator*Already known issues
VarlaInterestRateStrategyTheoretical attacks without proof
VarlaAccessManager
*Includes all liquidation mode contracts (VarlaMergeLiquidator, VarlaConvertLiquidator)

Severity levels (preview)

SeverityDescriptionExpected reward
CriticalDirect loss of user fundsTBD
HighSignificant risk to funds or protocol operationTBD
MediumLimited risk; requires specific conditionsTBD
LowMinor issues; no direct fund riskTBD

Acknowledgments

We will recognize security researchers who responsibly disclose vulnerabilities (with their permission). No researchers have been acknowledged yet.