Inverse Finance Bug Bounty Program

#017 - mills ERA

Created Mar 29th, 2022 - Executed Apr 6th, 2022




Written by @Crypterist @Nakamomo

Background & Problem

Bugs are an inevitable part of developing new software products. Today, Inverse relies on internal and volunteer members of the DAO for software development; however, our internal quality assurance processes should also include a way to leverage the skills/resources from contributors who specialize in looking for security-related bugs. Keeping this QA process in-house also carries a high opportunity cost within our engineering team and regardless would require recruiting/ building specialized capability. One crypto industry norm is to offer incentives to appeal to whitehat code testers in order to encourage them to test Inverse’s smart contracts and other code for security and other vulnerabilities.

Bug Bounty Incentive Programs

A common solution to “bulletproofing” smart contracts and other open source software for crypto DAO’s is a bug bounty program. Any bounty hunter is one who studies our code and business from an adversarial perspective and can make use of their own tools and techniques to identify vulnerabilities in the lookout for a reward or a bounty.. 3rd party platforms offer secure bug reporting processes (eg. Immunefi.com takes a 10% fee). Size of the rewards are based on the bounty's vulnerability risk rank.

Benefits Of A Bug Bounty Program

Identify security-related bugs in a collaborative/friendly manner with white hat researchers Highlights Inverse’s commitment to both security and transparency “Checks a box” for partner and investor due diligence As we aspire to grow to a business 1 Billion DOLA in circulation in 2022, emphasizing our commitment to mitigating risk is of paramount importance.

Costs of a Bug Bounty Program

Bug bounty rewards vary across DAOs. For example:

NameCriticalHighMediumLowMarket Cap

Bug Severity Examples:

  • Critical - Empty or Freeze the Smart Contract Holding, Holding Value at Risk
  • High - Token holders temporarily unable to transfer holdings
  • Medium - Contract consumes unbounded gas
  • Low - Contract fails to deliver promised returns, but doesn't lose value

Following 2 links give helpful information on Risk Rating and Severity Ranking of Vulnerabilities. https://owasp.org/www-community/OWASP_Risk_Rating_Methodology https://immunefi.com/severity-updated/

Managing a Bug Bounty Program

  • One popular website used to post and organize bug bounty programs is ImmuneFi. It offers access to an army of whitehat hackers who hunt for bounties and who when they identify a vulnerability will let us know in a safe and secure workflow that is managed by Immunifi.
  • Crypterist will be managing the bug bounty program for Inverse. He was a Certified Information System Security Professional prior and is experienced working on Software Security and Risk Mitigation. He has worked with Auditors like Grant Thornton to put close to 400 Security controls in his earlier professional career. If a bug is discovered within the Immunifi community, he will help organize the internal effort to validate the alleged vulnerability/workflow, resolve the bug (if necessary), and work with the Growth Working Group (if necessary) should the existence of the bug become public and any external/public messaging is required.


There are 3 Goals for this proposal.

  • 1.To establish how much will we agree to pay when setting up a bug bounty
    1. How will we pay once we receive the bug report
    1. To fund an initial budget allocation for payment of High and Medium severity bounties**

We will employ a 3rd party vendor for bug bounty services with the following reward rate guidelines:

Severity:Critical (DAO vote)::High:Medium:
  • Reward Payment in DOLA
  • 3rd party vendors take a fee in addition to the bounty (Immunefi charges 10%).
  • Critical severity bugs require a DAO vote and case by case consideration.

We consider bug bounties to be a lasting complement to any in-house security audit capabilities that Inverse Finance develops.

We request an allowance of up to $25,000 DOLA in 2022 for low or medium-severity bug bounties using an allowance for a SecOps multisig wallet. Rewards for high or critical severity bugs will require a separate funding mechanism (e.g. from Treasury reserves) that would be requested on a case-by-case basis and which would require a GovMills vote. Payout to white hats and vendors will be documented as Security Advisory Services to ensure that we don’t signal information of any adversarial attacks to malicious actors.

List of Smart Contracts Eligible for Bug Bounty Program:

  • Anchor Comptroller
  • Bonds Manager
  • Stabilizer
  • Treasury
  • Xinv Manager
  • DolaFlashloanMinter
  • Governor Mills
  • xINV
  • Oracle contract
  • Escrow
  • INV
  • All contracts used or authorized by on-chain proposals
  • Dola
  • Fed Anchor
  • Fuse Pool 22f
  • Policy Committee
  • Fed Fuse6
  • Fed Scream

Other applications eligible:

  • Inverse Website
  • AnchorPro

Items that are explicitly excluded from the bug bounty program:

  • Any testing with mainnet or public testnet contracts; all testing should be done on private testnets
  • Any testing with pricing oracles or third party smart contracts
  • Attempting phishing or other social engineering attacks against our employees and/or customers
  • Any testing with third party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
  • Any denial of service attacks
  • Automated testing of services that generates significant amounts of traffic
  • Public disclosure of an unpatched vulnerability in an embargoed bounty

Out of Scope & Rules

The following vulnerabilities are excluded from the rewards for this bug bounty program:

  • Attacks that the reporter has already exploited themselves, leading to damage
  • Attacks requiring access to leaked keys/credentials
  • Attacks requiring access to privileged addresses (governance, strategist)
  • Incorrect data supplied by third party oracles
  • Not to exclude oracle manipulation/flash loan attacks
  • Basic economic governance attacks (e.g. 51% attack)
  • Lack of liquidity
  • Best practice critiques
  • Sybil attacks


Action 1
Set Bug Bounty Program's


Allowance to


Bug Bounty Program,



Proof of Reviews

Members allowed to make Drafts can sign the fact that they reviewed the Draft Proposal


For Votes

13 voters

12.56k votes
















View All

Against Votes

0 voters

0.00 votes

Subscribe to Our Newsletter

Join thousands of subscribers in receiving weekly updates about Inverse products, partnerships, and early-bird news shared only with subscribers!