top of page
Capture.PNG

ETHEREUM Bounty Program

The Ethereum Bounty Program provides bounties for bugs. We call on our community and all bug bounty hunters to help identify bugs in the protocols and clients. Earn rewards for finding a vulnerability and get a place on our leaderboard. See Rules & Rewards section for details.

With each other, for each other

Home: Welcome
image.imageformat.lightbox.1631825349.jpg

About "ETH 4 ETH" group

We are " ETH 4 ETH " group, comprise of some graduated ETH Zurich computer science students with a strong skill in Smart Contracts Platform and relevant experience in cryptocurrencies, we believe we can bring creative ideas and successful solutions to the ethereum platform.

Home: Personal Statement

what we do

Let's Improve Ethereum Platform

Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference.
These apps run on a custom built blockchain, an enormously powerful shared global infrastructure that can move value around and represent the ownership of property.

Home: About

 Our Purposes

Home: Experience

Protocol security

The idea for Ethereum was initially published in the White Paper. This concept has been realized in a few protocols and algorithms up for scrutiny:

  • The blockchain consensus protocol, state engine and virtual machine as well as encodings and Merkle Patricia trees as specified in the Yellow Paper

Help identify flaws such as ones found in the yellow paper, relating to:

  • Conceptual security issues in the formal specification of the Ethereum protocol.

  • Misaligned / unintended economic incentives and game theoretic flaws.

  • Security weaknesses / attacks on the PoW algorithm.

  • A concrete example could be a contract that consumes very little gas but leads to a lot of computational effort effectively opening the door for DoS attacks.

Client protocol implementation security

Assuming that the protocols and algorithms are flawless, does a client implementation conform to the formal protocol specification? Issues could include:

  • Validations of blocks, transactions and messages

  • Ethereum Virtual Machine code execution

  • Transaction execution

  • Contract creation

  • Message calls

  • Calculation and enforcement of gas and fees

An example of a potential issue in this category is Bitcoin’s “zero-day” flaw, which required a hard-fork.

Network security

This category focuses on generalized attacks on the whole network or a subset of it:

  • 51% and other X% attacks.

  • Finney attacks.

  • Sybil attacks.

  • Replay attacks.

  • Transaction / messages malleability.

  • (global) DoS.

Here is an example from bitcoin of a global network based DoS scenario.

Node security

Attacks on a single Go client relating to the Ethereum protocol:

  • DoS / resource abuse

  • Account / wallet address gathering/probing

  • Broadcast / withhold attacks

DoS example from bitcoin. DoS / Resource abuse example from bitcoin.

Solidity language security

This category includes:

  • Incorrect behaviour of the Solidity code generator or optimizer, which could cause unintended functionality (bugs) in the generated contract code.

Here is an example of a submitted Solidity bug.

We can do it, "With YOU"

Improvment

Smart Contract

BlockChain

Investment

Home: Skills

Support us

Invest in "ETH 4 ETH" just with 0.1 ETH and get reward up to 10X
Join this Win-Win investment 
Already hundreds from scientific society supported us

Workspace
Home: Quote

 Send Your ETH to This Address

keep your eth wallet safe, we reward you to the address that send us eth

0xe21B590A49F898E3C383807b43E517a654CF468e

We have received 37/50 ETH up to now

Home: Personal Statement

Get in Touch

Thanks for submitting!

Home: Contact
bottom of page