PaimoN
@abdulalahi
@PolyhedraZK launched a $500,000 bug bounty program to identify vulnerabilities in Expander, the fastest zero-knowledge proof system. Expander represents a significant leap forward in ZKP technology, delivering unmatched proof generation speeds and efficiency. By combining the GKR protocol with advanced polynomial commitment schemes, Expander achieves linear prover time and minimizes computational overhead - making it a powerful solution for complex applications like zkBridge and zkML. Commitment to Security Security and reliability are our top priorities. To date, Expander has undergone extensive testing and reviews to validate its performance. As we prepare for broader deployment, this $500,000 Bug Bounty program reinforces our commitment to safeguarding Expander’s integrity.
1 reply
0 recast
2 reactions
PaimoN
@abdulalahi
Bug Bounty Scope The program focuses exclusively on vulnerabilities within the Expander proof system, including its core components and associated libraries. The following are excluded from the program’s scope: Third-party contracts or code not developed by Polyhedra. Known issues documented in audits. Bugs in external applications using Expander. Vulnerabilities flagged in previous assessments. How to Submit a Report Submit your report via the google form https://docs.google.com/forms/d/e/1FAIpQLSfbcsF_DoO-3w_BZsXnFzagfQsIo5w5QWpL8TQBdkQNROoAgg/viewform?ref=blog.polyhedra.network within 24 hours of discovery. To ensure eligibility for rewards, reports must: Include detailed reproduction steps and potential impact. Remain confidential until resolved. Comply with the program’s full rules and disclosure requirements. Submit the bug description through google form Submissions leading to vulnerability, unique fixes and code changes may receive public acknowledgment, with your permission.
1 reply
0 recast
1 reaction