88,888 ELF Bounty | aelf’s Hacker Bounty Phase 1 has Begun
The aelf Foundation is hosting a Hacker Bounty Phase 1 in order to demonstrate the security of the Cross-Chain Transfer Protocol (CCTP) and its corresponding lock-in contract. This event will encourage users to gain a comprehensive understanding of this protocol which was launched on May 14th, 2020. This event will be conducted as a Bounty Project by the aelf DAO to ensure transparency in execution and payment. It will be held in two phases, with the reward amount for phase 1 being 88,888 ELF.
ELF Token swaps use a Merkle Proof process where data is immutable and fully exposed on the blockchain, ensuring the security of users’ assets when conducting on-chain transactions such as Cross-Chain asset transfers. First, based on the ETH deployment lock contract and Merkle Tree contract, the ELF Tokens are locked for a limited time. After the Merkle tree root is generated, the user will then get the Merkle Proof data. Token Swaps can be initiated by recording the Merkle tree root data (the root hash value of the Merkle tree) on the aelf network. After the user’s mapping account data is verified, the corresponding ELF Test tokens are automatically transferred to the corresponding account address, completing the swap. When the lock-in period expires, only the original user can obtain the tokens from the lock-in contract, protecting the security of the user’s assets.
29th May 2020 20:00–5th June 2020 12:00 (GMT + 8)
- Individuals or teams can apply — there is no limit to the team size.
- This bounty activity is targeting aelf’s cross-chain transfer protocol (CCTP), other areas such as vulnerabilities on Ethereum or other areas of the aelf project will not be included.
- If any hacker is able to breach the cross-chain transfer protocol (CCTP) successfully and swap the ELF Test Tokens to his own account address during the event period, the aelf foundation will reward them with the equivalent amount in ERC20 ELF Tokens.
- The aelf Foundation will retrieve the reward if no hackers can breach aelf’s cross-chain transfer protocol (CCTP).
On May 29th, the aelf Foundation will lock 88,888 ELF Tokens in a lock-in contract.
On June 3rd, a Merkle tree will be generated.
On June 5th, 88,888 ELF Test Tokens will be swapped to the aelf testnet via the Cross-Chain Transfer Protocol (CCTP).
*The above actions will occur at 12:00pm (GMT +8) on the designated day
Lock-in Contract Information
- Ethereum testnet lockup contract address: 0xF135B2Eba5D3B690576a5C93062f992b592c0a04
- Merkle Tree generate contract address: 0xd31363f276AcABc2b8866736ED28F11b09C0cf02
- For Chinese users: Wechat account: a439714 (DaYuTongXue)
- For English users: Telegram: Doris Guo (@dorisYG )
Hackers need to show the proof of successfully hacking the tokens to the aelf team after they have hacked the cross-chain transfer protocol (CCTP).
The following contents needs to be provided as proof of successful hacking:
- Code for the hacking process
- An explanation document of the hacking process
- Individual/Team Introduction
- ELF wallet address
All white hat hackers, technology enthusiasts, or crack masters are encouraged to participate in this hacker bounty event and this event will provide participants with an in-depth understanding of the Cross-Chain Transfer Protocol (CCTP). Any feedback or suggestions on improving the aelf ecosystem are also encouraged!
— Join the Community:
· Read weekly articles on our aelf blog
· YouTube Channel: aelf
For more information, visit aelf.io