aelf
Published in

aelf

aelf’s Hacker Bounty Phase 1 has Concluded

The CCTP held true amid intense hacking from multiple teams

On May 29th, aelf launched phase 1 of the hacker bounty with a reward amount of 88,888 ELF based on the Cross-Chain Transfer Protocol (CCTP).

The Cross-Chain Transfer Protocol (CCTP) ensures the security of users’ assets when conducting on-chain transactions. If any hacker was able to breach the cross-chain transfer protocol (CCTP) successfully and swap the ELF Test Tokens to their own account address during the event, the aelf foundation would reward them with the equivalent amount in ERC20 ELF Tokens. This bounty activity specifically targeted the cross-chain transfer protocol (CCTP). Other areas such as vulnerabilities on Ethereum or other areas of the aelf project were not included.

As of June 5th, no hackers had successfully stolen the ELF Token, so no one could win the 88,888 ELF Token.

aelf held Phase 1 of the Hacker Bounty in order to demonstrate the security of the Cross-Chain Transfer Protocol (CCTP) and its corresponding lock-in contract. This event encouraged users to gain a comprehensive understanding of the CCTP and was conducted as a Bounty Project by the aelf DAO to ensure transparency in execution and payment.

Phase 2 of the Hacker Bounty will launch soon with a much more substantial reward pool. The specific time and details of the event will be announced in the official aelf community and we look forward to challenging hackers from around the world!

— Join the Community:

· Get on our Telegram Discord Slack and Kakao channel

· Follow us on Twitter Reddit and Facebook

· Read weekly articles on the aelf blog

· Catch up with the develop progress on Github

· Telegram community in 한국 ,日本語 ,русский ,العربية ,Deutsch ,ItalianoandTiếng Việt,

· Instagram: aelfblockchain

· YouTube Channel: aelf

For more information, visit aelf.io

--

--

--

ælf, the next breakthrough in Blockchain.

Recommended from Medium

I use LunarCrush to track social insights for cryptocurrencies. Check it out!

Choosing a Time Tracker: Self-Hosted vs. SaaS

SaaS vs. Self-hosted

Top 5 ways to detect malicious file manually

Newton Weekly | 2021.04.26–2021.05.02

Quick DFIR & TH :: File System Tunneling

Agent Sudo Walkthrough-Tryhackme

Newton Weekly | 2020.12.21–2020.12.27

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
ælf

ælf

ælf, the next breakthrough in Blockchain.

More from Medium

BusyDAO Development Update — 06/2022

Arseeding 1.0 Release: Arweave ANS-104 (Bundle) Light Node for any Developer!

Streamr Bonus Rewards Contest: Round Two

Staking and Delegation on PlatON Network