Close Menu

    Subscribe to Updates

    What's Hot

    Trove token tanks 95% as exchange pivots from Hyperliquid to Solana

    January 20, 2026

    DAO Wars: Your voice on the soft-fork dilemma

    January 20, 2026

    Ethereum price coils near resistance as staked ETH tops 30%

    January 20, 2026
    Facebook X (Twitter) Instagram
    laicryptolaicrypto
    Demo
    • Ethereum
    • Crypto
    • Altcoins
    • Blockchain
    • Bitcoin
    • Lithosphere News Releases
    laicryptolaicrypto
    Home Secured #4: Bug Bounty Rewards now up to $250,000 USD
    Ethereum

    Secured #4: Bug Bounty Rewards now up to $250,000 USD

    Michael JohnsonBy Michael JohnsonDecember 30, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    The Ethereum Foundation Bug Bounty Program is one of the earliest and longest running programs of its kind. It was launched in 2015 and targeted the Ethereum PoW mainnet and related software. In 2020, a second Bug Bounty Program for the new Proof-of-Stake Consensus Layer was launched, running alongside the original Bug Bounty Program.

    The split of these programs is historic due to the way the Proof-of-Stake Consensus Layer was architected separately and in parallel to the existing Execution Layer (inside the PoW chain). Since the launch of the Beacon Chain in December of 2020, the technical architecture between the Execution Layer and the Consensus Layer has been distinct, except for the deposit contract, so the two bug bounty programs have remained separated.

    In light of the coming Merge, today we are happy to announce that these two programs have been successfully merged by the awesome ethereum.org team, and that the max bounty reward has been substantially increased!

    Merge (of the Bug Bounty Programs) ✨

    With The Merge approaching, the two previously disparate bug bounty programs have been merged into one.

    As the Execution Layer and Consensus Layer become more and more interconnected, it is increasingly valuable to combine the security efforts of these layers. There are already multiple efforts being organized by client teams and the community to further increase knowledge and expertise across the two layers. Unifying the Bounty Program will further increase visibility and coordination efforts on identifying and mitigating vulnerabilities.

    Increased Rewards πŸ’°

    The max reward of the Bounty Program is now 250,000(paidoutinETHorDAI)forvulnerabilitiesinscope.UpgradesliveonpublictestnetsandtargetedforaMainnetreleasearealsoscope,andrewardsaredoubledduringthistime,whichmeansthatthemaxrewardis250,000 (paid out in ETH or DAI) for vulnerabilities in scope. Upgrades live on public testnets and targeted for a Mainnet release are also scope, and rewards are doubled during this time, which means that the max reward is 250,000(paidoutinETHorDAI)forvulnerabilitiesinscope.UpgradesliveonpublictestnetsandtargetedforaMainnetreleasearealsoscope,andrewardsaredoubledduringthistime,whichmeansthatthemaxrewardis500,000 during these periods!

    In total, this marks a 10x increase from the previous maximum payout on Consensus Layer bounties and a 20x increase from the previous max payout on Execution Layer bounties.

    Impact Measurement πŸ’₯

    The Bug Bounty Program is primarily focused on securing the base layer of the Ethereum Network. With this in mind, the impact of a vulnerability is in direct correlation to the impact on the network as a whole.

    While, for example, a Denial of Service vulnerability found in a client being used by 30% of the network.

    Visibility πŸ‘€

    In addition to the merge of the bounty programs and increase of the max reward, multiple steps have been taken to clarify how to report vulnerabilities.

    Github Security

    Repositories such as ethereum/consensus-specs and ethereum/go-ethereum now contain information on how to report vulnerabilities in SECURITY.md files.

    security.txt

    security.txt is implemented and contains information about how to report vulnerabilities. The file itself can be found here.

    DNS Security TXT

    DNS Security TXT is implemented and contains information about how to report vulnerabilities. This entry can be viewed by running dig _security.ethereum.org TXT.

    How can you get started? πŸ”¨

    With nine different clients written in various languages, Solidity, the Specifications, and the deposit smart contract all within the scope of the bounty program, there is a plenty for bounty hunters to dig into.

    If you’re looking for some ideas of where to start your bug hunting journey, take a look at the previously reported vulnerabilities. This was last updated in March and contains all the reported vulnerabilities we have on record, up until the Altair network upgrade.

    We’re looking forward to your reports! πŸ›



    Source link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Michael Johnson

    Related Posts

    DAO Wars: Your voice on the soft-fork dilemma

    January 20, 2026

    MakinaFi hit by $4.1M Ethereum hack as MEV tactics suspected

    January 20, 2026

    Security Alert – DoS Vulnerability in the Soft Fork

    January 20, 2026
    Leave A Reply Cancel Reply

    Demo
    Don't Miss
    Crypto

    Trove token tanks 95% as exchange pivots from Hyperliquid to Solana

    By John SmithJanuary 20, 20260

    Trove’s TROVE crashes 95% as team pivots from Hyperliquid to Solana while keeping most ICO…

    DAO Wars: Your voice on the soft-fork dilemma

    January 20, 2026

    Ethereum price coils near resistance as staked ETH tops 30%

    January 20, 2026

    MakinaFi hit by $4.1M Ethereum hack as MEV tactics suspected

    January 20, 2026

    LAI Crypto is a user-friendly platform that empowers individuals to navigate the world of cryptocurrency trading and investment with ease and confidence.

    Our Posts
    • Altcoins (53)
    • Blockchain (47)
    • Crypto (722)
    • Ethereum (427)
    • Lithosphere News Releases (11)

    Subscribe to Updates

    • Twitter
    • Instagram
    • YouTube
    • LinkedIn

    Type above and press Enter to search. Press Esc to cancel.