SlideShare a Scribd company logo
Bug Bounty for Blockchain Projects
Evgenia Broshevan,
Project Lead at HackenProof
What is a Bug Bounty program?
Bug bounty program is a process where organizations invite white hat hackers to
test their products for vulnerabilities (bugs) in exchange for monetary rewards
(bounties).
What is HackenProof?
Client that wants to test
Security of their systems
HackenProof provides
seamless communication
between hackers
and the client
Highly skilled white hat
hackers from all
over the world
Penetration Testing VS Bug Bounty
Bug Bounty Advantages
Limited in number of researchers
Limited in time
Limited in skill
Compensation based on process
Hundreds of researchers
Months or years of testing
Various background
Compensation based on bugs
Bug Bounty Program Types
● Public Programs
Everyone on the platform can participate. Great for large and mature products.
● Private programs
The client hand-picks a number of proven researchers with relevant background that are relevant
to the client. The program is completely anonymous. Great for pre-release and early products.
● Onsite Bug Bounty Events
A carefully selected group of 20-30 top hackers gathers in a single location to work on testing
the client’s product non-stop in marathon conditions for 1-3 days. Great for bringing attention
to your product, achieving quick results, and educating your security team.
Challenges in Blockchain Industry
● Insufficient detection coverage
● High demand and lack of supply
● Persistence
● Rapid and complex development lifecycle
State of the industry
Blockchain BB: https://hackenproof.com/public-bug-bounty-list
Bug Bounty in Blockchain
Company Launch Date Bounties Paid Bounty Range Hackers
Ethereum 2015 167200 500 - 25,000 26
Stellar 2017 N/A 500 - 25,000 19
Dash 2017 N/A 100 - 10,000 8
Monero 2017 N/A N/A 18
RSK April, 2018 23250 1,000 - 10,000 5
EOS May, 2018 514500 100 - 10,000 50
Vechain May, 2018 1500 500 - 10,000 8
Tron June, 2018 65700 100 - 10,000 13
Tezos June, 2018 0 N/A 0
Augur June, 2018 21450 1,000 - 200,000 7
PIVX July, 2018 150 200 - 5,000 3
Everitoken September, 2018 2500 500 - 5,000 1
TTC September, 2018 1500 600 - 5,000 2
How to launch a Bug Bounty Program?
EVGENIA BROSHEVAN
Project Lead at HackenProof
Email: e.broshevan@hacken.io
Twitter: @jerh17

More Related Content

Similar to Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at HackenProof

The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU Ahmed Banafa
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Neelu Tripathy
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain appsCigniti Technologies Ltd
 
The data driven startup
The data driven startupThe data driven startup
The data driven startupSimon Belak
 
Decentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by PentagonDecentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by PentagonLuyaoZhangPhD
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarmPolySwarm
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarmBlakeReyes
 
CA Service Virtualization
CA Service VirtualizationCA Service Virtualization
CA Service VirtualizationPablo Gutierrez
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)PacSecJP
 
Investing In Blockchain Startups - A Guide For Angels & VCs
Investing In Blockchain Startups - A Guide For Angels & VCs Investing In Blockchain Startups - A Guide For Angels & VCs
Investing In Blockchain Startups - A Guide For Angels & VCs Jamie Burke
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyIRJET Journal
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
Crowdfund: A decentralized platform for Secure and Trusted Crowdfunding
Crowdfund: A decentralized platform for Secure and Trusted CrowdfundingCrowdfund: A decentralized platform for Secure and Trusted Crowdfunding
Crowdfund: A decentralized platform for Secure and Trusted CrowdfundingIRJET Journal
 

Similar to Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at HackenProof (20)

Probe.ly
Probe.lyProbe.ly
Probe.ly
 
The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU The Blockchain Wave in 2019 and Beyond - SJSU
The Blockchain Wave in 2019 and Beyond - SJSU
 
Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0Security Testing ModernApps_v1.0
Security Testing ModernApps_v1.0
 
5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps5 top techniques for testing blockchain apps
5 top techniques for testing blockchain apps
 
The data driven startup
The data driven startupThe data driven startup
The data driven startup
 
4ire presentation
4ire presentation4ire presentation
4ire presentation
 
Company presentation
Company presentationCompany presentation
Company presentation
 
4ire labs presentation 2019
4ire labs presentation 20194ire labs presentation 2019
4ire labs presentation 2019
 
Decentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by PentagonDecentralized exchange-Banco: presented by Pentagon
Decentralized exchange-Banco: presented by Pentagon
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
 
Introduction to PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
 
CA Service Virtualization
CA Service VirtualizationCA Service Virtualization
CA Service Virtualization
 
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
 
Investing In Blockchain Startups - A Guide For Angels & VCs
Investing In Blockchain Startups - A Guide For Angels & VCs Investing In Blockchain Startups - A Guide For Angels & VCs
Investing In Blockchain Startups - A Guide For Angels & VCs
 
Quantstamp (qsp)
Quantstamp (qsp)Quantstamp (qsp)
Quantstamp (qsp)
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain TechnologyProduct Anticounterfeiting in Supply Chain Using Blockchain Technology
Product Anticounterfeiting in Supply Chain Using Blockchain Technology
 
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
apidays LIVE Singapore 2021 - Why verifying user identity Is not enough In 20...
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Crowdfund: A decentralized platform for Secure and Trusted Crowdfunding
Crowdfund: A decentralized platform for Secure and Trusted CrowdfundingCrowdfund: A decentralized platform for Secure and Trusted Crowdfunding
Crowdfund: A decentralized platform for Secure and Trusted Crowdfunding
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsVlad Stirbu
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform EngineeringJemma Hussein Allen
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Bug Bounty for Blockchain Projects by Evgenia Broshevan, Project Lead at HackenProof

  • 1. Bug Bounty for Blockchain Projects Evgenia Broshevan, Project Lead at HackenProof
  • 2. What is a Bug Bounty program? Bug bounty program is a process where organizations invite white hat hackers to test their products for vulnerabilities (bugs) in exchange for monetary rewards (bounties).
  • 3. What is HackenProof? Client that wants to test Security of their systems HackenProof provides seamless communication between hackers and the client Highly skilled white hat hackers from all over the world
  • 4. Penetration Testing VS Bug Bounty Bug Bounty Advantages Limited in number of researchers Limited in time Limited in skill Compensation based on process Hundreds of researchers Months or years of testing Various background Compensation based on bugs
  • 5. Bug Bounty Program Types ● Public Programs Everyone on the platform can participate. Great for large and mature products. ● Private programs The client hand-picks a number of proven researchers with relevant background that are relevant to the client. The program is completely anonymous. Great for pre-release and early products. ● Onsite Bug Bounty Events A carefully selected group of 20-30 top hackers gathers in a single location to work on testing the client’s product non-stop in marathon conditions for 1-3 days. Great for bringing attention to your product, achieving quick results, and educating your security team.
  • 6. Challenges in Blockchain Industry ● Insufficient detection coverage ● High demand and lack of supply ● Persistence ● Rapid and complex development lifecycle
  • 7. State of the industry Blockchain BB: https://hackenproof.com/public-bug-bounty-list
  • 8. Bug Bounty in Blockchain Company Launch Date Bounties Paid Bounty Range Hackers Ethereum 2015 167200 500 - 25,000 26 Stellar 2017 N/A 500 - 25,000 19 Dash 2017 N/A 100 - 10,000 8 Monero 2017 N/A N/A 18 RSK April, 2018 23250 1,000 - 10,000 5 EOS May, 2018 514500 100 - 10,000 50 Vechain May, 2018 1500 500 - 10,000 8 Tron June, 2018 65700 100 - 10,000 13 Tezos June, 2018 0 N/A 0 Augur June, 2018 21450 1,000 - 200,000 7 PIVX July, 2018 150 200 - 5,000 3 Everitoken September, 2018 2500 500 - 5,000 1 TTC September, 2018 1500 600 - 5,000 2
  • 9. How to launch a Bug Bounty Program?
  • 10. EVGENIA BROSHEVAN Project Lead at HackenProof Email: e.broshevan@hacken.io Twitter: @jerh17