Dolomite
  • Dolomite
  • DOLO
    • Token Mechanics
    • Airdrop
    • Distribution
  • Roadmap
  • Community XP
  • Minerals
  • Dolomite Balances
  • Guide
    • Depositing to Dolomite
    • Withdrawing from Dolomite
    • Borrow
    • Strategies
    • Zap
    • Trade
    • Pool
    • History
    • Stats
  • Campaign Guides
    • Zap your GLP! Campaign
    • Zap your ETH! Campaign
    • MIM Launch Campaign
    • jUSDC Launch Campaign
    • YT-GLP Launch Campaign
    • GM Launch Campaign
    • USDY Launch Campaign
    • mETH Launch Campaign
    • Guide To Level 4
  • Integrations
    • Berachain - Proof of Liquidity
    • GMX
      • GMX
      • GLP
      • GM
    • Abracadabra - magicGLP
    • Jones DAO - jUSDC
    • PlutusDAO - plvGLP
    • Pendle
      • Pendle - PT
      • Pendle - YT
    • Arbitrum - vARB
  • Markets
  • oARB Incentives Program
  • Risk Management
  • Different Networks
  • Smart Contract Addresses
    • Core - Immutable
    • Core - Proxies
    • Core - Routers
    • Module - dTokens
    • Module - DOLO
    • Module - General
    • Module - oARB Liquidity Mining
  • Admin Privileges
  • Admin Transactions
    • Transactions 38 - 50
    • Transactions 51 - 100
    • Transactions 101 - 150
    • Transactions 151 - 200
  • Audits & Security
    • Chainalysis Crypto Incident Response
  • Bug Bounty
  • FAQ
  • Media Kit
  • Developer Documentation
    • Dolomite Margin - Overview
    • Dolomite Margin - Glossary
    • Dolomite Margin - Getters
    • Dolomite Margin - Events
    • Dolomite Margin - dTokens
    • Depositing or Withdrawing
    • Managing Borrow Positions
    • Zapping Assets
    • Flash Loans
    • E-Mode & Segregated Risk
    • TypeScript Client
    • Subgraph
Powered by GitBook
On this page

Was this helpful?

Bug Bounty

The disclosure of security vulnerabilities helps us ensure the security of our users.

PreviousChainalysis Crypto Incident ResponseNextFAQ

Last updated 2 years ago

Was this helpful?

How to report a security vulnerability?

If you believe you’ve found a security vulnerability in one of our contracts or platforms, send it to us by emailing . Please include the following details with your report:

  • A description of the location and potential impact of the vulnerability.

  • A detailed description of the steps required to reproduce the vulnerability.

Scope

Any vulnerability not previously disclosed by us or our independent auditors in their reports.

Guidelines

We require that all reporters:

  • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, pilfering or permanent loss of any assets, and destruction of data during security testing.

  • Use the identified communication channels to report vulnerability information to us.

  • Keep information about any vulnerabilities you’ve discovered confidential between yourself and Dolomite until we’ve had 30 days to resolve the issue.

If you follow these guidelines when reporting an issue to us, we commit to:

  • Not pursue or support any legal action related to your findings.

  • Work with you to understand and resolve the issue quickly (including an initial confirmation of your report within 72 hours of submission).

  • Grant a monetary reward based on the risk assessment methodology.

security@dolomite.io
OWASP
The OWASP risk assessment chart