
AAVE
Decentralized non-custodial liquidity protocol for earning interest and borrowing assets
ETHARBOPMATICBaseDeFi LendingKYC RequiredPoC Required
Verified ProgramKYC RequiredPoC RequiredPrimacy of Impact
Max Bounty$1,000,000
Min Bounty$1,000
PayoutUSDC
Findings0
Accepted0
Chains5
Live SinceOct 2023
20 Audit Reports Available
2025 11 29 Pashov Aave v3.6External
2025-112025 11 18 Certora Aave v3.6Certora
2025-112025 11 18 MixBytes Aave v3.6MixBytes
2025-112025 11 18 Savant Aave v3.6External
2025-112025 11 16 Blackthorn Aave v3.6External
2025-112025 07 18 MixBytes AaveV3.5MixBytes
2025-072025 07 17 ABDK Aave v3.5External
2025-072025 07 14 Certora AaveV3.5Certora
2025-072025 06 12 Blackthorn v3.4 ReportCode4rena
2025-062025 06 11 Certora Aave v3.4 ReportCertora
2025-062021-11-aave-v3-securityreview.pdfTrail of Bits
2021-112026-02-aave-v4-securityreview.pdfTrail of Bits
2026-02Aave Protocol V2Consensys Diligence
2020-09Aave Safety ModuleConsensys Diligence
2020-09Aave Governance DaoConsensys Diligence
2020-08Aave Balancer and Uniswap v2 Price ProvidersConsensys Diligence
2020-08Aave TokenConsensys Diligence
2020-07Aave CPM Price ProviderConsensys Diligence
2020-05README.mdMixBytes
README.mdMixBytes
01Severity & Rewards
02Program Rules
- 01Proof of Concept is required for all submissions. Reports without a working PoC demonstrating the vulnerability will not be considered.
- 02KYC verification is required before bounty payout. Researchers must complete identity verification to receive rewards.
- 03This program follows Primacy of Impact โ valid findings are rewarded based on demonstrated impact regardless of whether the specific attack vector was previously known.
- 04Only previously unreported vulnerabilities are eligible. Duplicate submissions will be closed.
- 05Vulnerabilities must be reported through the WhiteClaws platform. Public disclosure before resolution disqualifies the submission.
- 06Testing must not disrupt live protocol operations. Use mainnet forks or testnets for Proof of Concept execution.
- 07For Critical severity findings, the security team may arrange direct communication for expedited resolution.
โ IN SCOPE
- โAave V3 Pool contracts
- โLending and borrowing logic
- โLiquidation mechanism
- โFlash loan implementation
CRITICAL FUNCTIONS
supply()borrow()liquidationCall()HIGH FUNCTIONS
flashLoan()setUserUseReserveAsCollateral()repay()โ OUT OF SCOPE
- โFrontend interface
- โGovernance voting UI
- โAave V2 legacy contracts
โ Protocol Information
Audited By
Immunefi
OpenZeppelin
Certora
Peckshield
PeckShield
Spearbit
Sherlock
OtterSec
MixBytes
Cantina
Bounty program indexed and verified by WhiteClawsProgram data sourced from on-chain analysis and public bounty disclosures.