Uniswap

Uniswap

@uniswap
Live

Maximum reward

$15,500,000

Severity

Max. Reward

Critical

$15,500,000

High

$1,000,000

Medium

$100,000

Deposit required

$50

Findings submitted

631

Start date

26 Nov 2024

Please sign in as a researcher to join the bounty.

Log in

In scope

Severity

Min and Max Reward

Critical

Up to $15,500,000


High

Up to $1,000,000


Medium

Up to $100,000


Low

Up to $0


Informational

Up to $0

Smart Contract - Uniswap v4 Core

Critical Impact Examples (Maximum Reward: $15,500,000)

Vulnerability TypeExample ScenarioWhy Critical
Theft of Pooled LiquidityReentrancy in modifyLiquidity() allows draining all liquidity from a pool during a single transactionAffects 20%+ of TVL, immediate user fund loss
Accounting ManipulationInteger overflow in swap calculation lets attackers drain pool reservesProtocol insolvency, affects all pools
Hook BypassVulnerability allows bypassing before/after hooks on all swaps, enabling unauthorized state changesBreaks core security assumptions, affects all v4 pools using hooks
Misconfigured Contract TakeoverA misconfigured core protocol component allows taking ownership or DoSCatastrophic protocol-wide impact
Flash Accounting BypassExploit in flash accounting system allows withdrawing funds without repayingDirect theft, affects entire protocol TVL

High Likelihood Indicators

  • Exploitable by any user with basic knowledge
  • Requires < $1,000 initial capital
  • Can be executed in a single transaction
  • No special timing or conditions needed

High Impact Examples (Maximum Reward: $1,000,000)

Vulnerability TypeExample ScenarioWhy High
Single Pool DrainBug in specific tick math allows draining high-value pools (e.g., WETH/USDC)0.5–20% of TVL affected
Oracle ManipulationTime-weighted average price (TWAP) can be manipulated through specific transaction orderingPrice oracle compromise, affects dependent protocols
Lock BypassingReentrancy mechanism can be bypassed to perform unauthorized nested operationsSecurity model violation, medium exploitation difficulty
Fee Collection ExploitBug allows claiming fees belonging to other LPs in specific conditionsTheft of unclaimed yield

Medium Likelihood Indicators

  • Requires specific pool configurations or parameters
  • Needs coordination of multiple transactions
  • Requires moderate capital ($10K–$100K)
  • Timing-dependent or requires specific market conditions

Medium Impact Examples (Maximum Reward: $100,000)

Vulnerability TypeExample ScenarioWhy Medium
Tick ManipulationEdge case in tick bitmap causes incorrect liquidity allocation or substantially different swap outcomes than expectedUndermines protocol guarantees, impacts only one pool
Rounding ErrorsMinor rounding in specific edge cases causes dust-level losses (<$1 per tx)Minimal economic impact

Low Likelihood Indicators

  • Requires rare combination of conditions
  • Very specific pool parameters needed
  • Affects only certain token pairs or configurations
  • Limited economic incentive for attacker

Smart Contract – Other Uniswap Contracts

Critical Examples – Up to $2,250,000

Contract TypeExampleImpact
Permit2Signature validation bypass allows spending any user's tokensAffects all users using Permit2
Universal RouterCommand execution bug allows arbitrary calls with user's token approvalsDirect theft from router users

High Examples – Up to $500,000

Contract TypeExampleImpact
NFT Position ManagerBug allows transferring someone else's liquidity position NFTTheft of specific positions
Swap RouterSlippage protection can be bypassed, enabling sandwich attacks beyond toleranceAffects individual swaps
Name
Description
Asset
V4 Core Contracts

-

Universal Router Contract Code

-

Permit2 Contract Code

-

V3 Contract Code

-

UniswapX Contract Code

-

Uniswap Interface Code

-

Calibur 7702 Delegation Contract

Deployed on Mainnet, Unichain, Base, Optimism, BNB. Testnet deployments on Unichain and Sepolia

-

Liquidity Launcher

-

Continuous Clearing Auction

-

Protocol Fees

-

Protocol Fees

-

Out of scope

  • v4 hooks that were not developed by Uniswap Labs.
  • Clickjacking (we do allow 3rd parties to iframe us)
  • DDOS
  • Bugs in third party code
  • Dev branches that are not deployed in public packages or contracts
  • Third party contracts that are not under the direct control of Uniswap Labs
  • Issues already listed in the audits for the contracts above
  • Bugs in third party contracts or applications that use Uniswap contracts
  • Brute force attacks
  • Rounding errors
  • Cache-control header settings
  • Extreme market turmoil vulnerability
  • Gas optimization recommendations
  • Task Hijacking (Strandhogg)
  • Any vulnerability that is previously known by the Uniswap Labs team
  • Certificate Pinning on Mobile
  • Cache-control header settings

Unichain Out of Scope