Category: Treasury
Abstract: This proposal, written in collaboration with the Jito Foundation, requests 1 million JTO funds from the Jito DAO to manage and payout potential bug rewards for a Bug Bounty Program administered by the security firm Asymmetric Research (“AR”). The Foundation would manage these funds, which are expected to cover at least 12-24 months of bounties. Any unspent funds at the conclusion of the program will be returned to the DAO. This program will cover both current and future Jito protocols.
Motivation: The program aims to enhance the security of the Jito Network by incentivizing the discovery of vulnerabilities through structured and strategic efforts. The security of the Jito Network is paramount to its success and user trust. Bug bounties have historically been an ideal way for DeFi to incentivize the security community to harden protocols and give an avenue for possible blackhats to receive rewards without executing exploits. Successful examples include:
- Wormhole Bug Bounty Program:
- Overview: Wormhole announced a bug bounty program with a maximum payout of $10 million. This program aims to identify critical vulnerabilities in its bridge protocol to prevent future incidents.
- Impact: This bounty program is one of the largest in the crypto space and has helped raise awareness of the importance of security in cross-chain protocols (Immunefi).
- Marinade Finance Bug Bounty Program:
- Overview: Marinade Finance, a non-custodial liquid staking protocol on Solana, has a bug bounty program with rewards up to $250,000 for critical vulnerabilities. This program focuses on preventing the loss of user funds, governance funds, and unclaimed yield through various smart contract vulnerabilities.
- Impact: The program has been crucial in securing Marinade’s smart contracts, ensuring the safety and integrity of staked assets (Immunefi) .
- Solana Foundation Bug Bounty Program:
- Overview: The Solana Foundation runs an extensive bug bounty program through platforms like HackenProof, offering rewards ranging from $5,000 to $2,000,000 for critical vulnerabilities.
- Impact: This program covers a wide range of potential security issues across smart contracts, web APIs, and other areas, helping to secure the Solana ecosystem by attracting a large pool of skilled security researchers (HackenProof) .
This initiative will improve the network’s security posture and demonstrate the DAO’s commitment to maintaining a secure environment for users. The bug bounty program will leverage AR’s expertise to attract top-tier security researchers and ensure thorough testing and reporting of potential security issues.
Key Terms:
- Bug Bounty Program: A program that offers rewards for identifying and reporting bugs in software.
- Asymmetric Research (“AR”): The security firm managing the Bug Bounty Program.
Specification: This proposal will send 1 million JTO to a 3-of-5 multisig controlled by three Jito Foundation members and two AR members to cover the potential payouts related to the Bug Bounty Program.
AR, a leading security firm with extensive experience conducting such programs, will manage the Bug Bounty Program. The program will follow preset rules and guidelines and cover various categories of vulnerabilities, with rewards based on the severity of the identified issues.
In brief, the Bug Bounty Program, launching on August 1, 2024, requires participants to complete KYC and adhere to strict eligibility criteria. Rewards for critical vulnerabilities can reach up to $250,000, with payouts in JTO on Solana, based on USD value. Known issues must be substantiated with verifiable evidence, and responsible disclosure guidelines are strictly enforced. Certain impacts, like attacks requiring leaked credentials or centralization risks, are out of scope, and prohibited activities include phishing and denial of service attacks.
If a bug deserves a payout under the Rules, the Jito Foundation will manage payment according to the terms laid out in the Rules.
A full breakdown of the program’s rules and terms will be provided to the community following the launch of the program.
Program Structure:
- KYC Requirements: Participants must complete KYC to receive payouts. Required information includes full name, date of birth, proof of address, and a copy of a government-issued ID.
- Eligibility Criteria: Restrictions on who can participate, ensuring fairness and security. Exclusions include individuals on OFAC’s SDN list, past or present official contributors, and security auditors who reviewed the project.
- Reward Calculation: The reward is calculated based on the severity of the vulnerabilities. Rewards for critical issues can go up to $250,000.
- Payouts: Rewards will be distributed in JTO on Solana, denominated in USD. The calculation is based on the 7-day TWAP of JTO at the time of settlement.
Benefits/Risks:
- Benefits: Enhanced network security, increased user trust, proactive vulnerability management, and attracting top security talent to identify potential threats.
- Risks: Potential overspending if numerous high-severity bugs are found; however, this risk is mitigated by capping rewards and having a structured payout system.
Outcomes:
- Potential identification and mitigation of critical vulnerabilities.
- Strengthened security posture of the Jito Network.
- Increased confidence among users and stakeholders in the network’s security measures.
- Documentation and analysis of vulnerabilities to improve future security measures and protocols.
Cost Summary: The total upper bound cost of the program is 1 million JTO, allocated for potential bug bounty payouts. The funds will be used for the actual bounty payouts to participants and administration costs. The DAO will be informed of any payouts as they occur, and any unspent funds will be returned to the DAO after 24 months.
Performance Milestone:
- Yearly reviews: AR will regularly evaluate the program’s effectiveness and make necessary adjustments based on community feedback and empirical data. Metrics will include the number of vulnerabilities reported, severity levels, and the speed of resolution.