📜Platform Rules

In order to facilitate cordial and productive exchanges between protocol customers and whitehats, Sherlock has established a set of rules for whitehats and protocol customers to define proper conduct.

Breaking these rules as a whitehat could result in removal or ban from the Sherlock platform and/or withholding of payout.

Breaking these rules as a protocol team could result in removal from the Sherlock platform and/or provide cause for breakage of the mutually signed agreement.

Whitehats

Ethical Standards

  • Adhere to ethical standards and legal guidelines. Any actions that compromise the integrity, privacy, or availability of systems beyond what is necessary for testing are strictly prohibited.

  • No harm: Ensure that your testing does not negatively impact users or infrastructure.

  • Always default to the assumption that the protocol team has good intentions.

  • Do not threaten, blackmail, dox, or otherwise create a negative environment for the protocol customer.

  • Do not communicate with the protocol customer outside of the official channel provided by Sherlock

  • By submitting a vulnerability through Sherlock, you are agreeing to abide by the outcome of the Sherlock dispute resolution process

Testing Environment

  • Replicating tests on public mainnet or testnet is prohibited. All testing should be conducted on local forks of either testnet or mainnet.

  • Use only authorized environments for testing to avoid any unintended disruptions or security risks.

  • Avoid testing with external dependencies and third-party systems not controlled by the protocol customer to avoid any leaks of the potential vulnerability

Service Disruptions

  • Any denial of service attacks that are executed against project assets are strictly forbidden.

  • Automated testing of services that generates significant amounts of traffic is not permitted.

Vulnerability Disclosure

  • Do not publicly disclose vulnerabilities before they are resolved. Reports must be submitted through the Sherlock platform, and we will notify you when it is safe to disclose.

  • Do not discuss (publicly or otherwise) any aspect of a submitted vulnerability without consent from the protocol customer

  • Report via Sherlock: Use the official reporting channels to submit your findings.

  • Never exploit a vulnerability or threaten to do so

  • Do not attempt to rescue funds without the written consent of the protocol customer

  • Publicly known bugs or bugs reported in a previous audit are never eligible for payout or reimbursement of deposit

Payouts

  • Do not try to cajole a protocol customer into paying you. Always use the provided Sherlock resolution mechanisms.

Protocol Customers

Ethical Standards

  • Do not communicate with the whitehat outside of the official channel provided by Sherlock.

  • Do not pay whitehats who submit bugs on Sherlock outside of Sherlock’s designated channel or without Sherlock’s consent.

  • Do not claim a bug report is a known or duplicate issue without clear evidence of where it was publicly available before the whitehat’s submission timestamp.

  • Always default to the assumption that the whitehat has good intentions.

  • By listing your bug bounty program on Sherlock, you are agreeing to abide by the outcome of the Sherlock dispute resolution process.

Last updated