Bug Bounty
HyENA Bug Bounty Program
1. Scope
On mainnet, any bug that could reasonably lead to user fund loss, unfair execution, or integrity failures in the HIP-3 DEX or oracle system is in scope, including:
Incorrect oracle price publication or calculation
Manipulation vectors in oracle updates or aggregation logic
Desynchronization between on-chain oracle state and off-chain reference prices
Availability issues that can be turned into profit (e.g., asymmetric downtime that enables manipulation)
Any additional issue not contemplated above that could reasonably lead to user fund loss, unfair execution, or integrity failures
2. Submission Reports and Rewards
Reports must include:
Description: Clear explanation of the vulnerability and affected component(s)
Reproduction: Detailed step‑by‑step instructions and any required scripts or transactions
Proof of Concept: Working PoC that demonstrates real exploitability (not just a theoretical issue)
Impact Assessment: Reasonable explanation of potential impact (e.g., “X% price manipulation”, “Y funds at risk”)
Submit your report to: [email protected]
If the same bug is reported by multiple parties, only the first valid report is eligible for a reward.
Rewards are paid in USDe on either HyperEVM or HyperCore for responsible disclosure based on severity.
HyENA contributors commit not to pursue legal action for security research conducted in good faith and in compliance with this program.
3. Prohibited Activity
To protect users, infrastructure, and third parties, the following are strictly prohibited:
Mainnet Exploitation
Active exploitation on mainnet beyond what is strictly necessary to prove impact in a controlled manner - if impact can be proven or demonstrated without such action, the action is expressly prohibited
Any testing that leads to real user losses or large-scale disruption
Testing Scope
Testing on mainnet when equivalent tests can reasonably be performed on testnet or local forks
DoS attacks
Testing involving third-party systems and applications
Abuse & Extortion
Phishing or other social engineering
Ransom demands, blackmail, or threats
Public disclosure of a vulnerability before it is fixed and any bounty is paid
Threatening to publish or publishing personally identifiable information (PII) or sensitive data without consent
Exploiting vulnerabilities for personal financial gain beyond the bounty, including trading on undisclosed vulnerabilities, MEV-style extraction, or manipulating on-chain markets
Bypassing Program Rules
Attempting to bypass the submission process
Engaging in unauthorized activity outside the scope defined in this program
4. Eligibility
To be eligible for a bounty:
Reports must be submitted to [email protected] only (no external platforms).
The reporter must comply with any required KYC/KYB procedures.
The reporter must be technically able to receive USDe on the supported networks.
The reporter must maintain confidentiality about the vulnerability and related communications until and unless authorized in writing to disclose.
The issue must be reproducible and supported with clear evidence and a PoC.
Contributors to the codebase (employees, contractors, core devs) are not eligible to receive bounties for vulnerabilities in code they contributed to.
HyENA reserves the right to declare an entity or individual ineligible based on applicable sanctions, regulatory requirements, or legal restrictions.
5. Ineligible Submissions
The following types of submissions are not eligible for rewards:
Reports without sufficient detail:
Missing step‑by‑step reproduction
No working PoC when one is reasonably feasible
Vulnerabilities requiring extremely unlikely or unreasonable user behavior, such as:
Disabling basic security features
Ignoring explicit warnings in the UI or docs
Issues dependent on:
Outdated or unsupported software versions
Unpatched browsers or operating systems that are no longer supported
Rooted / jailbroken / otherwise modified user devices
Issues in third‑party libraries, extensions, tools, or infrastructure that do not result in a direct exploitable vulnerability in the HIP3 DEX or oracle system
Purely non‑security issues:
Minor performance problems
Cosmetic UI bugs
Typos or documentation nits (unless they cause a real loss or security issue)
Vulnerabilities that only manifest under extreme, unrealistic, or clearly contrived market conditions that do not reflect plausible real‑world scenarios.
6. General Conditions
No bounty is owed for submissions that:
Do not meet the program’s requirements, or
Are excluded by the scope or ineligibility criteria.
The project retains sole discretion to determine:
Whether a submission is valid,
How to classify its severity, and
The exact bounty amount within the published ranges.
All submissions become the property of the project. The project may:
Use, modify, or disclose submissions for security and operational purposes
Share information with partners or auditors as needed, without additional consent from the reporter
Participation in this program does not create any employment or partnership relationship.
7. Classification & Reward Guidelines
Severity is determined by impact and likelihood. Payouts may vary within each range depending on exploitability, quality of report, and whether the researcher provided fixes or mitigations.
Critical – up to 100,000 USDe
Bugs that can cause direct, significant loss of user funds or catastrophic integrity failures, for example:
Oracle price manipulation allowing profitable, repeated abuse (e.g., under/over-pricing leading to liquidations or unfair PnL)
Smart contract vulnerabilities allowing:
Direct draining or theft of user funds
Permanent lockup of significant funds
High – up to 25,000 USDe
Bugs causing severe disruption or partial but contained impact, for example:
HyENA HIP-3 DEX downtime that blocks:
New orders/cancellations for a significant period
Oracle updates critical to fair pricing
Oracle or data-feed disruptions that:
Cannot be directly exploited for fund theft, but
Materially affect trading or risk systems
Access control or authentication issues that:
Allow privileged but non‑catastrophic actions
Risk targeted but not systemic losses
Medium – up to 7,500 USDe
Bugs with moderate impact or limited exploitability, such as:
Logic errors that:
Only occur in rare edge cases
Have limited or no immediate fund impact
Information disclosure that:
Reveals non‑public but non‑sensitive data
Could aid future attacks but is not directly exploitable
Low – up to 1,500 USDe
Bugs that have low impact or are primarily best‑practice violations, for example:
Minor API inconsistencies or error handling flaws
Documentation or configuration issues that:
Could mislead integrators or power users
Do not present an immediate exploit path
8. Process & Timelines
Acknowledgment: The HyENA team aims to acknowledge valid reports within 72 hours.
Triage & Classification: Severity assessment and initial triage typically completed within 7–14 days.
Remediation & Payout:
Fixes for critical/high issues are prioritized and deployed as soon as safely possible.
Bounty awards are generally paid within 14 days of confirming the vulnerability and agreeing on classification, subject to KYC/KYB completion.
Timelines are best‑effort and may vary based on complexity or required coordination with external partners.
9. Contact
Primary security contact: [email protected]
Last updated