for security researchers

Find real bugs and get paid directly.

Browse live bounty programs, submit encrypted reports, and track payouts in one account. No waitlists and no third-party gatekeeping.

  • Start with wallet, social, or email sign-in and attach payout wallet settings later.
  • Submit high-signal findings to scope-defined programs with status updates from triage to payment.
  • Earn bounty payouts plus seasonal point-based $WC allocation for meaningful contributions.

457

Bounties Listed

USDC / ETH

Payout Types

Base

Primary Chain

Finding lifecycle:

Submitted→Triaged→Accepted→Paid

Or Submitted β†’ Rejected / Duplicate with reason and linked history.

Severity guide

Critical β€” direct theft, insolvency, systemic compromise.
High β€” major loss or manipulation risk.
Medium β€” protocol disruption or significant degradation.
Low β€” informational/best-practice gaps with limited immediate impact.

Points breakdown

Security (highest) β€” accepted findings, paid bounties, severity and PoC bonuses.
Growth β€” onboarding activity and protocol-side contributions.
Engagement β€” weekly cadence and streak consistency.
Social β€” verification/share actions with anti-spam controls.