Uniswap

Uniswap

@uniswap
Live

Maximum reward

$15,500,000

Severity

Max. Reward

Critical

$15,500,000

High

$1,000,000

Medium

$100,000

Deposit required

$50

Findings submitted

631

Start date

26 Nov 2024

Please sign in as a researcher to join the bounty.

Log in

In scope

Severity

Min and Max Reward

Critical

Up to $250,000


High

Up to $50,000


Medium

Up to $10,000

Infrastructure findings include vulnerabilities affecting Uniswap Labs’ operational environment and supporting systems, including:

  • Cloud infrastructure (e.g., AWS, GCP, Cloudflare, hosted services)
  • CI/CD pipelines (GitHub Actions, build systems, deployment workflows, NPM packages)
  • Container registries and artifact storage
  • DNS configuration and domain management, PKI
  • Production deployments and configuration management
  • Public RPC infrastructure (including Unichain RPC & transaction ingress)
  • Backend services supporting routing, quoting, or transaction preparation
  • Secrets management systems
  • Monitoring and alerting systems (if exploitable)

Infrastructure findings must demonstrate clear and actionable security impact.

Critical Examples – Up to $250,000

Vulnerability TypeExampleWhy Critical
CI/CD Pipeline CompromiseAttacker gains control over deployment pipeline (GitHub Actions, artifact registry, NPM) and deploys malicious version of app.uniswap.orgMass wallet-draining via trusted domain; entire user base affected
Cloud IAM / Secrets CompromiseAccess to production IAM roles or secrets (backend signing keys, API tokens, deploy keys)Modify routing logic, manipulate transactions, inject malicious parameters
DNS Hijack of Official DomainDNS takeover of app.uniswap.orgPixel-perfect phishing clone; traffic redirection; direct wallet drain

High Examples – Up to $50,000

Vulnerability TypeExampleImpact
SSRF to Cloud MetadataSSRF allowing access to AWS IMDS or internal services, demonstrably leveraged for credential retrieval or lateral movementPrivilege escalation, stepping stone to broader compromise
Overly Permissive IAM PoliciesProduction roles allow unnecessary administrative actionsViable lateral movement path; potential malicious deployment chain
Production API Exposure Without AuthInternal/admin APIs accessible without proper authUnauthorized routing or operational manipulation

Medium Examples – Up to $10,000

Vulnerability TypeExampleImpact
Minor Privilege EscalationEscalation within non-production or low-impact serviceLimited blast radius; requires chaining
RCE on Unused Instance/SystemLegacy unused instance publicly accessible and vulnerable to RCE via outdated dependencyCode execution on internal system owned by Uniswap
Name
Description
Asset
NPM packages

NPM packages under @uniswap org

Out of scope

  • v4 hooks that were not developed by Uniswap Labs.
  • Clickjacking (we do allow 3rd parties to iframe us)
  • DDOS
  • Bugs in third party code
  • Dev branches that are not deployed in public packages or contracts
  • Third party contracts that are not under the direct control of Uniswap Labs
  • Issues already listed in the audits for the contracts above
  • Bugs in third party contracts or applications that use Uniswap contracts
  • Brute force attacks
  • Rounding errors
  • Cache-control header settings
  • Extreme market turmoil vulnerability
  • Gas optimization recommendations
  • Task Hijacking (Strandhogg)
  • Any vulnerability that is previously known by the Uniswap Labs team
  • Certificate Pinning on Mobile
  • Cache-control header settings

Unichain Out of Scope