Up to 0.5% of the total DIAM Coin Supply is Allocated to Reward Successful Bounty Hunters. Please review the Program Terms and Scope below. The Diamante Bug Bounty Program is Seeking Researchers and Developers to find and Report any other Vulnerabilities in the Protocol Infrastructure, Including:
Three types of Bounties that vary in Bug Severity and Bounty Size. D0 Bounties are the most Critical and Will be Valued the Highest.
Vulnerabilities that could Cause Validator, Archiever, Watcher, or End-User Funds to be Exploited, Stolen, or Locked up.
Vulnerabilities that could Cause Private User Information (i.e. Keys, Private Key Information) Stolen.
Vulnerabilities in the Validator Software (e.g. DIAM Node, Validator CLI) that could result in the Malfunction or not running Effectively.
Vulnerabilities that could cause the Protocol or Query Market to "halt" or Impact the Liveness of the Protocol.
Determinism Bugs that could Lead to Incorrect or Inconsistent Query results by Validators in the Network.
Vulnerabilities that could Degrade the Validation or Querying Service.
Impersonation or Sybil Attack Vulnerabilities