Uniswap
@uniswapLive
Maximum reward
$15,500,000
Severity
Max. Reward
Critical$15,500,000
High$1,000,000
Medium$100,000
Deposit required
$50
Findings submitted
631
Start date
26 Nov 2024
Please sign in as a researcher to join the bounty.
Log inIn scope
Smart ContractsWebsitesOtherUnichain L1 ContractsUniswap InfrastructureMobile Apps and Chrome Extension
Severity
Min and Max Reward
CriticalUp to $2,250,000
High
Up to $100,000
Medium
Up to $50,000
Any L1 contract deployment which puts Unichain User’s funds at risk but does not impact other OP Stack chains. See this for a non-exhaustive list of L1 contracts. For the issue to be in scope, the contract must be actively in use.
Unichain Contracts (L1)
Critical Examples – Up to $2,250,000
| Vulnerability Type | Example | Why Critical |
|---|---|---|
| Bridge Theft | Canonical bridge vulnerability allows withdrawing ETH without L2 burn | Direct theft of bridged assets |
| Finality Bypass | Fault proof exploit finalizes invalid state roots | Protocol insolvency |
| Sequencer Bypass | Force inclusion of malicious transactions bypassing sequencer checks | System integrity compromise |
High Examples – Up to $100,000
| Vulnerability Type | Example | Why High |
|---|---|---|
| Temporary Freeze | Bug allows griefing withdrawals during 7-day challenge period | Temporary fund freeze |
| Incorrect Bond Math | Challenge bonds drained through dispute sequences | Economic attack on validators |
| Sequencer Bypass | Malicious inclusion bypasses intended checks | System integrity compromise |
Asset Name | Description |
|---|---|
| Unichain L1 Contracts |
Out of scope
- v4 hooks that were not developed by Uniswap Labs.
- Clickjacking (we do allow 3rd parties to iframe us)
- DDOS
- Bugs in third party code
- Dev branches that are not deployed in public packages or contracts
- Third party contracts that are not under the direct control of Uniswap Labs
- Issues already listed in the audits for the contracts above
- Bugs in third party contracts or applications that use Uniswap contracts
- Brute force attacks
- Rounding errors
- Cache-control header settings
- Extreme market turmoil vulnerability
- Gas optimization recommendations
- Task Hijacking (Strandhogg)
- Any vulnerability that is previously known by the Uniswap Labs team
- Certificate Pinning on Mobile
- Cache-control header settings
Unichain Out of Scope
-
Core OP Stack code. Researchers should notify Optimism via their Immunefi Bedrock Bug Bounty Program
-
Flashblocks
-
UVN
-
unichain-node repository
-
unichain.org top level and docs.unichain.org