Bware Labs Bets $100,000 on Blast quality by launching a Bug Bounty campaign

Anca Chirila
Bware Labs
Published in
6 min readMay 24, 2022

We are thrilled to announce the launch of our bug bounty program on Blast, in partnership with Immunefi, Web3’s leading bug bounty platform. Users and hackers can try out all the features currently available in Blast and submit any issues found through the Immunefi platform.

Building on our promise to Empower Web3 Development and to create a high-performing and secure ecosystem for Web3 builders and users, we have partnered with Immunefi to offer rewards to those who help us identify any potential issues on Blast. While our services and infrastructure are diligently tested and reviewed in-house, our partnership with Immunefi will strengthen our quality and security efforts and will help us build on our promise of reliability, paving the road for the release of Blast V2, which will be decentralized.

Bware Labs Bug Bounty powered by Immunefi

Through this partnership, Bware Labs plans to reward developers, hackers, and techies who find bugs and vulnerabilities in our API Infrastructure platform. The Immunefi bug bounty covers a number of features and assets, such as the UI performance and security of Blastapi.io. The severity of these issues is classified on a 4-level scale from “Low” to the highest level “Critical”. You can find more information and details in the updated Immunefi documentation: https://immunefi.com/severity-updated/. Rewards are distributed according to the impact of the bug, based on the Immunefi Vulnerability Severity Classification System V2.1

The following severity definitions are considered within the Blast bug bounty campaign scope:

Websites and Applications

Critical

  • Execute arbitrary system commands
  • Retrieve sensitive data/files from a running server such as /etc/shadow, database passwords, and blockchain keys(this does not include non-sensitive environment variables, open-source code, or usernames)
  • Taking down the application/website
  • Taking state-modifying authenticated actions (with or without blockchain state interaction) on behalf of other users without any interaction by that user, such as, changing registration information, commenting, voting, making trades, withdrawals, etc.
  • Direct theft of user funds
  • Malicious interactions with an already-connected wallet such as modifying transaction arguments or parameters, substituting contract addresses, submitting malicious transactions

High

  • Injecting/modifying the static content on the target application without Javascript (Persistent) such as HTML injection without Javascript, replacing the existing text with arbitrary text, arbitrary file uploads, etc.
  • Changing sensitive details of other users (including modifying browser local storage) without already-connected wallet interaction and with up to one click of user interaction, such as email or password of the victim, etc.
  • Improperly disclosing confidential user information such as email address, phone number, physical address, etc.
  • Subdomain takeover without already-connected wallet interaction

Medium

  • Changing non-sensitive details of other users (including modifying browser local storage) without already-connected wallet interaction and with up to one click of user interaction, such as changing the first/last name of the user, or enabling/disabling notifications
  • Injecting/modifying the static content on the target application without Javascript (Reflected) such as reflected HTML injection or loading external site data
  • Redirecting users to malicious websites (Open Redirect)

Low

  • Changing details of other users (including modifying browser local storage) without already-connected wallet interaction and with significant user interaction such as iframing leading to modifying the backend/browser state (must demonstrate impact with PoC)
  • Any impact involving a publicly released CVE without a working PoC
  • Taking over broken or expired outgoing links such as social media handles, etc.
  • Temporarily disabling users to access target site, such as locking up the victim from login, cookie bombing, etc.

Out of Scope & Rules

The following vulnerabilities are excluded from the rewards for this bug bounty program:

  • Attacks that the reporter has already exploited themselves, leading to damage
  • Attacks requiring access to leaked keys/credentials
  • Attacks requiring access to privileged addresses (governance, strategist)

Websites and Apps

  • Theoretical vulnerabilities without any proof or demonstration
  • Content spoofing / Text injection issues
  • Self-XSS
  • Captcha bypass using OCR
  • CSRF with no security impact (logout CSRF, change language, etc.)
  • Missing HTTP Security Headers (such as X-FRAME-OPTIONS) or cookie security flags (such as “httponly”)
  • Server-side information disclosure such as IPs, server names, and most stack traces
  • Vulnerabilities used to enumerate or confirm the existence of users or tenants
  • Vulnerabilities requiring unlikely user actions
  • URL Redirects (unless combined with another vulnerability to produce a more severe vulnerability)
  • Lack of SSL/TLS best practices
  • DDoS vulnerabilities
  • Attacks requiring privileged access from within the organization
  • Feature requests
  • Best practices
  • Vulnerabilities primarily caused by browser/plugin defects
  • Any vulnerability exploit requiring CSP bypass resulting from a browser bug
  • UI related bugs

The following activities are prohibited by this bug bounty program:

  • Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
  • Any testing with pricing oracles or third party smart contracts
  • Attempting phishing or other social engineering attacks against our employees and/or customers
  • Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
  • Any denial of service attacks
  • Automated testing of services that generates significant amounts of traffic
  • Public disclosure of an unpatched vulnerability in an embargoed bounty

Our team strongly believes that this campaign will enhance Blast, by adding another layer of verification to our already existing test strategy. Furthermore, we would like to point out that we are excited to cooperate with the community to keep delivering bulletproof products that will empower Web3 development and accelerate adoption.

For more information on Immunefi’s coverage of Blast, please visit: https://immunefi.com/bounty/bwarelabs/

About Immunefi

Immunefi is the premier bug bounty platform for smart contracts and DeFi projects, where security researchers review code, disclose vulnerabilities, get paid, and make crypto safer. Immunefi removes security risk through bug bounties and comprehensive security services.

Launched on December 9, 2020, Immunefi focused on blockchain and smart contract security. We provide bug bounty hosting, consultation, bug triaging, and program management services to blockchain and smart contract projects.

Bug bounty programs are open invitations to security researchers to discover and disclose potentially vulnerabilities in projects’ smart contracts and applications, thereby protecting projects and their users. For their good work, security researchers receive a reward based on the severity of the vulnerability, as determined by the project affected.

Why have a bug bounty program at all? In 2020 alone, hacks and scams cost the DeFi community over $238m, and bug bounties can prevent those hacks from happening. Bug bounty programs surface vulnerabilities so they can be fixed before they get exploited in malicious hacks that destroy projects and ruin reputations.

Twitter | Discord | Medium | YouTube | Telegram

About Bware Labs

The Bware Labs’ mission is to create an infrastructure and development ecosystem that will help Web3 builders throughout their entire blockchain journey. The company aims to play a decisive role in worldwide blockchain adoption.

Proving its commitment to bringing true reliability and quality to Web3, Bware Labs has partnered with some of the greatest names in the industry such as Polygon, Avalanche, Elrond, Moonbeam, and Fantom, to support blockchain development efforts by providing the highest quality infrastructure services in the crypto space.

The first and primary product developed under the Bware Labs umbrella is Blast, a blockchain API platform featuring easy blockchain access to the most relevant networks in the space. Using Blast, developers are able to get RPC and Websocket access to an ever-growing number of blockchain networks in just a couple of simple steps.

Along with their dedicated endpoints, Blast users also have access to relevant dashboards showing their request trends, are able to organize their work in separate projects, and even test their requests inside the platform itself.

With a total TVL of more than $40M, Bware Labs also supports Blockchain projects from a validator role. Capitalizing on its engineering team’s vast blockchain experience, the company is trusted by more than 15 Blockchain Networks to run validators for their projects.

About Blast

Bware Labs Decentralized API Infrastructure, Blast, aims to provide the most resilient infrastructure service and the fastest response times in the industry.

Blast is making use of clustering mechanisms and third-party node geographical distribution in order to help Web3 developers in getting their infrastructure needs covered easily and allow them to focus solely on the development of their applications.

Subscribe to Bware Labs social channels for additional updates.

Socials:

Telegram community:

For proposals or inquiries, shoot us an email.

  • info@bwarelabs.com

--

--