RSK Bug Bounty Program Submission
For full details on the bounty program please visit https://bounty.rsk.co
Email address *
Name *
Note: You may provide a pseudonym, however it makes you ineligible for BTC rewards unless you choose to donate your bounty reward to charity.
Your answer
Short Description *
Example: Remote Denial-of-service using non-validated blocks.
Your answer
Attack scenario *
Example: An attacker can send blocks which may require a high amount of computation (the maximum gasLimit) but has no proof-of-work. If the attacker sends blocks continuously, the attacker may force the victim node to 100% CPU utilization.
Your answer
Software components & affected versions
Example: rskj client version v0.4.0
Your answer
Instructions to reproduce *
Example: Send a block to a testnet node which contains many txs but no valid PoW. Or better send a file with reproduction details or a working proof of concept.
Your answer
Details
Any other details not covered.
Your answer
Submit
Never submit passwords through Google Forms.
This form was created inside of RSK. Report Abuse - Terms of Service