Pendle Boros Bounty

Pendle Boros Bounty

@pendle-finance
Live

Total reward

$500,000

Findings submitted

35

Start date

19 Sep 2025

Please sign in as a researcher to join the bounty.

Log in

Pendle Boros is the first protocol that provides a marketplace for on-chain interest rate swaps. The protocol enables users to take long or short positions on variable interest rates with leverage through a hybrid system combining a central limit order book and AMM.

The bug bounty program is focused on smart contract security and is primarily concerned with preventing loss of user funds and protocol insolvency. Further resources regarding Boros can be found at boros.pendle.finance.

Contracts in Scope

The following Boros core contracts deployed on Arbitrum are in scope:

AddressContract
0x8080808080daB95eFED788a9214e400ba552DEf6Router
0x1080808080f145b14228443212e62447C112ADaDMarketHub
0x2080808080262c1706598c9DBDD3a0cD3601e5eaAccessController
0x3080808080Ee6a795c1a6Ff388195Aa5F11ECeE0MarketFactory
0x3205e972714B52512c837AE6f5FCFDeB07f0f23CAMMFactory
0x353C6Ba99500f9F5a7937aF7BF26c8E40817518BAdminModule
0xD0808080803c59dBF8825290bca8979786C2d65BMakerIncentiveDistributor
0xD180808080402FE41711Db560B8db5C41e21Df71AMMIncentiveDistributor

Additionally, active markets and related contracts are also in scope:

Award Levels

Rewards are distributed based on vulnerability severity and potential economic impact.

SeverityMaximum PayoutMinimum Payout
CriticalUp to $500,000 USD$50,000 USD
HighUp to $100,000 USD$20,000 USD
MediumUp to $50,000 USD$10,000 USD
LowAt discretion

Note: Rewards are capped at 10% of economic impact for fund-loss scenarios.

Severity Definitions

Technical Exploits

This covers vulnerabilities in smart contract implementation that could lead to theft or loss of funds. These are traditional bugs in the code itself, as opposed to economic design flaws covered in the next section.

Severity is determined by both the amount of funds at risk and likelihood of exploitation:

Likelihood>10% TVL1-10% TVL<1% TVL
HighCriticalHighMedium
MediumHighMediumMedium or Low
LowMediumMedium or LowLow

For vulnerabilities that result in immediate token extraction out of Boros contracts, the funds at risk are calculated as 100% of exploitable amount.

For vulnerabilities that result in artificially inflated account balances but not immediate token extraction (i.e. still subject to withdrawal cooldown), the funds at risk are calculated as 20% of the exploitable amount (after deducting attack costs). However, a vulnerability that results in an inflated account balance that can be leveraged to cause protocol insolvency will be considered higher severity. This type of vulnerability will be assessed based on the potential total economic damage to the protocol, not just the capped amount.

Note: The adjusted funds at risk are used as the "economic impact" for reward calculation. For vulnerabilities mitigated by the cooldown mechanism, this effectively caps rewards at 2% of the exploitable amount (20% funds at risk × 10% reward cap). The minimum payout still applies.

Economic Exploits

Economic exploits are vulnerabilities in the protocol's design, as opposed to direct coding bugs, that can lead to systemic financial damage without necessarily involving a direct theft of funds. These include economic design flaws and manipulation strategies that exploit legitimate protocol mechanisms.

Unlike technical exploits where funds at risk can be calculated relatively precisely, economic exploits often have complex, cascading effects that make standardized calculations difficult. Therefore, severity will be determined on a case-by-case basis at Pendle's sole discretion, based on our assessment of the potential total financial damage to the protocol. Factors considered may include direct losses, user funds at risk, market dysfunction duration, confidence impact, and systemic risks. Pendle reserves the right to make final determinations on both the validity and severity of all economic exploit submissions.

Likelihood/ImpactSignificantModerateMinimal
HighHigh or CriticalHighMedium
MediumHighMediumLow
LowMediumLowLow

Other Vulnerabilities

For other vulnerabilities, the Pendle team exercises discretion, together with Cantina, to determine final severity based on the specific context and potential impact of each vulnerability.

Out of Scope

Security researchers are still encouraged to report the out of scope issues. Awards for out of scope issues to be determined at the discretion of Pendle Finance.

The Pendle team will be very flexible in assessing all submissions, with the goal of prioritizing the security of the protocol.

Excluded from Bounty Program

  • Issues not from contracts listed in "Contracts in Scope" section
  • Known issues from previous audits
  • Third-party protocols or tokens integrated with Boros
  • Frontend applications and UI bugs
  • Infrastructure vulnerabilities (DNS, servers, CDN)
  • MEV that doesn't violate protocol invariants
  • Issues requiring unlikely user behavior or social engineering
  • Vulnerabilities in underlying blockchain infrastructure

Specific Issue Types Not Eligible

  • Informational findings without security impact
  • Design choices and protocol architecture decisions
  • User errors preventable by frontend validation (e.g., transfers to address(0))
  • Minor rounding errors without economic impact
  • Gas consumption optimizations
  • Vulnerabilities requiring extreme market conditions

Rules and Guidelines

Testing Requirements

  • No Mainnet Testing: All testing must be on local forks (e.g., using Foundry)
  • Responsible Disclosure: No public disclosure before issue resolution
  • Confidentiality: Maintain strict confidentiality until authorized disclosure

Submission Rules

  • Each vulnerability must be reported separately
  • Only previously unknown vulnerabilities are eligible
  • No exploitation for profit or damage
  • First valid submission receives the reward for duplicates
  • Quality of submission significantly impacts reward amount

Eligibility

Eligible Participants:

  • Independent security researchers
  • White hat hackers
  • Security firms not previously engaged with Pendle

Ineligible Participants:

  • Current or former Pendle team members or contractors
  • Auditors who reviewed Boros code
  • Anyone with privileged access to Boros development

Resources

Other Terms

By submitting a report, you grant Pendle the rights necessary to investigate, mitigate, and disclose the vulnerability. Reward decisions and eligibility are at the sole discretion of Pendle. The terms, conditions, and scope of this Program may be revised at any time. Participants are responsible for reviewing the latest version before submitting a report.