|
The Support Scope governs all routine aspects of ecosystem support, including governance process infrastructure and management, Star support and Ecosystem Actor support.
This Article defines ecosystem security infrastructure and processes to protect the Sky Protocol and its users.
This Section manages Sky Ecosystem security infrastructure and initiatives.
View Provenance
As one of the most important DeFi protocols with a high TVL, the Sky Protocol is a honeypot for hackers and other nefarious actors. The Sky Protocol must always be protected by an active Bug Bounty Program. This document regulates the budget and processes of the Bug Bounty Program, which serves to protect the Sky Protocol and its users from hacks and exploits. The Bug Bounty Program is conducted on the Immunefi platform.
The subdocuments herein describe the scope of the Sky Bug Bounty Program, which currently includes both Sky Protocol and Spark Protocol.
View Provenance
A selection of vulnerabilities is deemed out of scope for the Bug Bounty Program. An overview of these out of scope vulnerabilities can be found on Sky’s listing on the Immunefi platform (https://immunefi.com/bounty/makerdao/). Feasibility limitations also apply, which can be found in the aforementioned listing on the Immunefi website.Specific rules applying to the Bug Bounty Program can be found at the website above, listed under the following categories:• Repeatable attack limitations• Restrictions on security researcher eligibility• Public disclosure of known issues• Proof of Concept (PoC) requirements• Other terms and information• Prohibited activitiesFor SparkLend, the rules, terms, and exceptions can be found on SparkLend’s listing on the Immunefi platform (https://immunefi.com/bounty/sparklend/).