Posted on 2023-01-11

UPDATE, Feb 13, we've activated two more challenges listed below

We are happy to inform that we just activated the second round of our bountiful bug bounty contest. Make sure to read the initial announcement if you aren't yet familar with the project.

Before you hack

Before you get going, please take a minute to help us gather some feedback about our bug bounty contest through our one minute survey.

Changes

After the first round got exploited we fixed the (stupid!) bug, made a few smaller tweaks and have now redeployed the whole system.

We have also created two more game implementation. but for now we decided against activating these just yet. Instead we decided to let some time pass with the existing code challenges and activate the new ones after enough time passed without someone having managed to find any exploits. We deployed these two extra challenges after one month passed without the existing contracts getting exploited.

We have also lowered the lock deposit amount from 1 to 0.1 ETH because that should still be enough for the front running protection scheme to work and at the same time be more inclusive to hackers around the world.

Addresses of deployed mainnet contracts

These are the addresses of the contracts that were deployed on the Ethereum mainnet. We also provide links to the tagged bountiful code that was used for the deployment. Please note that Etherscan doesn't yet support Fe source code verification which means that there is no code visible for these contracts at Etherscan. If you like to see Fe support on Etherscan, please reach out to them and let them know.

Registry contract: 0x76eB86d4f92901f2af0d10feDDdA0B3B4630700D (source code)

Game contracts:

NEW, Feb 13

How to start

If you don't know how to get started, make sure to read the initial announcement, it contains all the needed information and is kept up to date.