readme
This commit is contained in:
43
README.md
43
README.md
@@ -1,19 +1,34 @@
|
|||||||
## DODO CrowdPoolingV2 Audit Scope
|
# DODO V2: Help 1 Trillion People Issue Token
|
||||||
|
|
||||||
- contracts/CrowdPooling/impl/CP.sol
|
## Audit Report
|
||||||
- contracts/CrowdPooling/impl/CPFunding.sol
|
|
||||||
- contracts/CrowdPooling/impl/CPStorage.sol
|
|
||||||
- contracts/CrowdPooling/impl/CPVesting.sol
|
|
||||||
|
|
||||||
*Note: CrowdPoolingV2 && CrowdPoolingV1 code diff*
|
[Audited by Peckshield](https://github.com/DODOEX/contractV2/blob/main/audit/PeckShield-Audit-DODOV2-v1.0.pdf)
|
||||||
|
|
||||||
- [https://github.com/DODOEX/contractV2/blob/starter/cpV2&&cpV1-diff.html](https://github.com/DODOEX/contractV2/blob/starter/cpV2&&cpV1-diff.html)
|
## Bug Bounty 💰
|
||||||
|
|
||||||
## DODO Starter Audit Scope
|
### Rewards
|
||||||
|
|
||||||
- contracts/DODOStarter/impl/FairFunding.sol
|
Severity of bugs will be assessed under the [CVSS Risk Rating](https://www.first.org/cvss/calculator/3.0) scale, as follows:
|
||||||
- contracts/DODOStarter/impl/InstantFunding.sol
|
|
||||||
- contracts/DODOStarter/impl/Storage.sol
|
- Critical (9.0-10.0): Up to $100,000
|
||||||
- contracts/DODOStarter/impl/Vesting.sol
|
- High (7.0-8.9): Up to $10,000
|
||||||
- contracts/Factory/DODOStarterFactory.sol
|
- Medium (4.0-6.9): Up to $5,000
|
||||||
- contracts/SmartRoute/proxies/DODOStarterProxy.sol
|
- Low (0.1-3.9): Up to $1,000
|
||||||
|
|
||||||
|
In addition to assessing severity, rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability.
|
||||||
|
|
||||||
|
### Disclosure
|
||||||
|
|
||||||
|
Any vulnerability or bug discovered must be reported only to the following email: contact@dodoex.io; must not be disclosed publicly; must not be disclosed to any other person, entity or email address prior to disclosure to the contact@dodoex.io email; and must not be disclosed in any way other than to the contact@dodoex.io email. In addition, disclosure to contact@dodoex.io must be made promptly following discovery of the vulnerability. Please include as much information about the vulnerability as possible, including:
|
||||||
|
|
||||||
|
- The conditions on which reproducing the bug is contingent.
|
||||||
|
- The steps needed to reproduce the bug or, preferably, a proof of concept.
|
||||||
|
- The potential implications of the vulnerability being abused.
|
||||||
|
|
||||||
|
A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount.
|
||||||
|
|
||||||
|
Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution, if agreed.
|
||||||
|
|
||||||
|
## Contact Us
|
||||||
|
|
||||||
|
Send E-mail to contact@dodoex.io
|
||||||
Reference in New Issue
Block a user