Pendle Bounty
Total reward
$2,000,000
Findings submitted
41
Start date
14 Jun 2024
Please sign in as a researcher to join the bounty.
Log inPendle is the first protocol that enables the trading of tokenized future yield on an AMM system. The project aims to give holders of yield-generating assets the opportunity to generate additional yield and to lock in future yield upfront, while offering traders direct exposure to future yield streams, without the need for an underlying collateral.
Further resources regarding the Pendle can be found at pendle.finance
The bug bounty program is focused around its smart contracts and is mostly concerned with the loss of user funds.
Contracts in Scope
The following table contains the address of Pendle V2 system contracts across all chains that Pendle V2 was deployed.
Additionally, markets that are whitelisted on Pendle V2 platform is also considered in scope.
-
This includes
StandardizedYieldToken
(SY),PendlePrincipalToken
(PT),PendleYieldToken
(YT),PendleYieldTokenV2
(YTv2) andPendleMarket
(Market). -
Please note that each asset will have a different SY but the same PT, YT (or YTv2), and Market.
-
The list of currently active and inactive markets can be obtained using the following endpoints from our Backend:
- https://api-v2.pendle.finance/core/docs#/Markets/MarketsSimplifiedController_getActiveMarkets
- https://api-v2.pendle.finance/core/docs#/Markets/MarketsSimplifiedController_getInactiveMarkets
- Markets that are not obtainable by the above endpoints are not whitelisted by us.
- Markets that are inactive or not whitelisted by us will NOT be considered if the vulnerability is isolated in that market only and does not affect the Pendle V2 system or the other markets.
- Markets that are inactive or not whitelisted by us will be considered if the vulnerability has system-wide impact, or impacts on active markets.
-
SY contracts that are not deployed and audited by Pendle Team will NOT be considered.
- To see if a SY contract is deployed and audited by Pendle Team, go to
https://app.pendle.finance/trade/markets/<market_address>/swap
and see the market info:
- To see if a SY contract is deployed and audited by Pendle Team, go to
-
The underlying contracts that SY and Market based on are considered out of scope.
Award Levels
Level | Very Critical | Critical | High | Medium | Low |
---|---|---|---|---|---|
Max | 2,000,000 USD | 1,000,000 USD | 100,000 USD | 20,000 USD | To be awarded at the discretion of Pendle Finance |
Min | 200,000 USD | 100,000 USD | 10,000 USD |
Rewards are capped at 10% of economic impact.
Detailed Reward calculation
- For very critical/critical/high smart Contract bugs, the reward amount is 10% of the funds directly affected up to a maximum of 2,000,000 USD/1,000,000 USD/100,000 USD respectively.
- The calculation of the amount of funds at risk is based on the time and date the bug report is submitted.
- However, a minimum reward of 200,000 USD/100,000 USD/10,000 USD is to be rewarded in order to incentivize security researchers against withholding a bug report.
Cross-Market Limitations
- If multiple markets whitelisted on Pendle can be exploited with the same vulnerability, the fund at risk is the combined sum of the fund that can be stolen across those markets.
Repeatable Attack Limitations
- For smart contracts where the vulnerability exists can be upgraded or paused, only the stolen funds from the first attack is considered the fund at risk.
- For smart contracts where the vulnerability exists can NOT be upgraded or paused, the fund at risk of each attack will be calculated as follows:
- 100% funds that could be stolen from the first attack.
- max(0, 100% - 25% * ⌈t⌉) funds that could be stolen from the subsequent attack, where t is the time from the first attack, in hour (25% funds reduction by hour).
- If the attack has cross-chain impact:
- Among all of the sent transactions across all chain supported by Pendle, the transaction with the lowest block time is consider the first attack.
- Claimable-yields (interests and rewards) that can be stolen by the attacks are also considered fund at risks.
Feasibility Limitations
- Bug reports about an attack that focuses only on the underlying protocol of one of the markets whitelisted on Pendle V2, without any exploits on Pendle V2’s contracts, will NOT be considered for this bug bounty program.
- Even though Pendle V2 users can lose their fund when interacting with Pendle V2, the reason was the exploitation on the underlying protocol, forcing incompatibility with the Pendle V2 system.
- Bug reports that require an attack that involve one or more other protocols (e.g. utilizing flash loans from a margin protocol or manipulating the spot prices on a DEX), either to make an attack more severe than it would be in isolation, or to achieve an attack that would otherwise be impossible or infeasible, would be downgrade by one severity level.
- However, they will be considered as in-scope and categorized according to the program rules as long as all of the following are true:
- Losses or other negative effects of the attack are inflicted upon Pendle V2 users.
- The additional protocols used must have enough liquidity in various assets to allow the attack to succeed at the time of bug report submission. For example: if an attack requires an ETH flash loan, but the amount is larger than all the ETH available for loan across the ecosystem
- However, they will be considered as in-scope and categorized according to the program rules as long as all of the following are true:
Severity levels
For manipulation that can steal/freeze users' funds
Likelihood/Impact | >10% TVL | 1-10% TVL | < 1% TVL |
---|---|---|---|
High | Very Critical | Critical | High or Critical |
Medium | Critical | High or Critical | High |
Low | High or Critical | High | Medium |
For other manipulation
The Pendle team will exercise its discretion, together with the Cantina team, to judge the severity with the aim of awarding fairly to security researchers.
Likelihood/Impact | Significant | Moderate | Minimal |
---|---|---|---|
High | High or Critical | High | Medium |
Medium | High | Medium | Low |
Low | Medium | Low | Low |
Out of Scope (all repositories)
If an issue is discovered and is not from the files listed as In Scope above, security researchers are encouraged to report the finding. Awards for out of scope issues to be determined at the discretion of Pendle Finance.
The Pendle team will be very flexible in assessing all submissions, with the goal of prioritizing the security of the protocol.
Known Public Issues
Known issues from previous security reviews are considered out of scope.
- pendle-core-v2-public/audits are considered as out-of-scope.
Known but not Public Issues
Are considered out of scope.
Specific Types of Issues
- Informational findings.
- Design choices related to protocol
- Issues that are ultimately user errors and can easily be caught in the frontend. For example, transfers to
address(0)
. - Rounding errors.
- Relatively high gas consumption.
- Extreme market turmoil vulnerability.
Prohibited Actions
- Any testing on mainnet or public testnet deployed code; all testing should be done on local-forks of either public testnet or mainnet
- Any testing with pricing oracles or third-party smart contracts
- Attempting phishing or other social engineering attacks against our employees and/or customers
- Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
- Public disclosure of bugs without the consent of the protocol team.
- Conflict of Interest: any employee or contractor working with Project Entity cannot participate in the Bug Bounty.