Notice
The Inference.net Staking Protocol is being tested on Solana Devnet with test
tokens. These tokens have no monetary value and should not be used for
real-world transactions or bought or sold by anyone.
Scope
The following components are in scope for this bug bounty program: Solana Programs:- Staking Program
- Airdrop Program
- Node software and auto-update mechanisms
- GPU detection and validation systems
- Job routing and distribution logic
- Inference engine management
- API endpoints and authentication
- Dashboard and web applications
- Wallet integration points
- Off-chain reward calculation systems
Out of Scope: Third-party services, social engineering attacks, and issues
already known or being addressed.
Vulnerability Category Overview
Severity | USD Payout Range |
---|---|
Critical | $10,000 - $50,000 |
High | $2,500 - $10,000 |
Medium | $500 - $2,500 |
Low | $100 - $500 |
Inference System Exploits | $1,000 - $25,000 |
Critical Severity
Vulnerabilities that could result in:- Direct theft of operator or delegator funds
- Unauthorized minting or burning of tokens
- Compromise of any on-chain vaults
- Compromise of any system private keys
- Arbitrary code execution on node infrastructure
- Complete bypass of inference job authentication
High Severity
Vulnerabilities that could result in:- Temporary freezing of user funds
- Manipulation of reward calculations affecting multiple users
- Unauthorized access to operator pools
- Significant disruption of the inference network
- Bypass of stake-weighted routing logic
Medium Severity
Vulnerabilities that could result in:- Limited impact on individual users
- Minor reward calculation errors
- Temporary service disruptions
- Information disclosure of non-sensitive data
- Bypass of rate limiting or spam protections
Low Severity
Vulnerabilities that could result in:- UI/UX issues with security implications
- Minor information leaks
- Best practice violations without direct impact
- Issues requiring significant user interaction
Inference System Exploits
We’re particularly interested in vulnerabilities related to the integrity of our inference system:- Faking completed inference requests to earn rewards without processing
- Manipulating job routing to receive disproportionate rewards
- Bypassing GPU validation to register unsupported hardware
- Exploiting the unified inference engine selection logic
Rewards for inference system exploits scale with the potential economic impact
and the number of affected operators or users.
Submission Process
How to Report
-
Prepare Your Report (see template below) - Include:
- Detailed description of the vulnerability
- Step-by-step reproduction instructions
- Potential impact assessment
- Suggested fixes (if applicable)
-
Submit Securely:
- Email: [email protected]
- DO NOT disclose publicly before resolution
-
Wait for Acknowledgment:
- Initial response within 48 hours
- Severity assessment within 7 days
- Resolution timeline provided based on severity
Report Template
Rules and Guidelines
Responsible Disclosure
- DO NOT exploit vulnerabilities beyond proof of concept
- DO NOT perform attacks that could harm users or the network
- DO NOT publicly disclose before we’ve had time to fix the issue
- DO report vulnerabilities promptly upon discovery
- DO provide sufficient detail for reproduction
Review Process
Severity Assessment
Our security team evaluates submissions based on:- Exploitability: How difficult is the attack to execute?
- Impact: What damage could be caused?
- Likelihood: How probable is real-world exploitation?
- Novelty: Is this a new discovery or known issue?
Bounty Calculation
Final rewards consider:- Severity level (Critical/High/Medium/Low)
- Quality of the report and reproduction steps
- Suggested fixes and mitigation strategies
- Responsible disclosure adherence
- First reporter (in case of duplicates)
Rewards are at the discretion of the Inference.net security team. We aim to be
fair and competitive with industry standards.
Contact
Please submit all reports or questions to [email protected].FAQ
Q: Can I test on the mainnet when it launches?A: No, all testing must be performed on Devnet only. Mainnet testing is strictly prohibited. Q: Can I submit multiple vulnerabilities in one report?
A: Please submit separate reports for distinct vulnerabilities to ensure proper tracking. Q: What if my vulnerability is marked as duplicate?
A: The first reporter receives the full reward. Subsequent reporters may receive a smaller acknowledgment reward. Q: How do you handle partial vulnerabilities?
A: We reward based on the furthest point of exploitation demonstrated, even if not fully weaponized.
Updates and Changes
This bug bounty program may be updated as our system evolves:- Check this page regularly for updates
- Major changes will be announced in Discord
- Submissions are evaluated based on the rules at time of submission
Last updated: July 2025 | Version 1.0