Security Rewards Program

Bug Bounty Program

Help secure the Positronic blockchain. Find vulnerabilities, earn ASF rewards. We value the security community's contributions to making our network safer.

🏆

Reward Tiers

Critical
50,000 ASF
Remote code execution, consensus bypass, private key extraction, chain halt
High
20,000 ASF
Double-spend, unauthorized fund access, validator slashing bypass, state corruption
Medium
5,000 ASF
DoS attacks, rate limit bypass, memory leaks, P2P message injection
Low
1,000 ASF
Information disclosure, minor config issues, non-critical error handling gaps
🎯

Scope

Component Description Status
Consensus Engine DPoS/BFT consensus, validator election, finality, slashing In Scope
Transaction Pipeline TX validation, mempool, gas calculation, priority lanes In Scope
Cryptography Ed25519 signatures, SHA-512 hashing, AES-256 keystore, post-quantum In Scope
P2P Network Peer discovery, message propagation, block sync, Kademlia DHT In Scope
RPC Server JSON-RPC API, authentication, rate limiting, access control In Scope
AI Validation ML transaction scoring, quarantine system, model integrity In Scope
Smart Contracts PositronicVM execution, gas metering, contract storage In Scope
Database Layer AES-256-GCM encryption at rest, WAL mode, schema migration, state integrity In Scope
Chain Reorg Engine ForkManager, competing block storage, longest-chain rule, finality guard In Scope
Upgrade System Feature flags, schema migration, activation/rollback lifecycle In Scope
Compliance System Forensic reports, court reports, wallet registry In Scope
Desktop App UI Visual bugs, layout issues, cosmetic defects Out of Scope
Website positronic-ai.network website (informational only) Out of Scope
Third-Party Libraries Issues in upstream dependencies (report upstream) Out of Scope
📜

Rules & Guidelines

📨

How to Report

1

Discover a Vulnerability

Test on the public testnet or a local node. Clone the repository from GitHub and run python -m pytest tests/ -v to understand the test coverage.

2

Write a Detailed Report

Include: affected component, severity assessment, step-by-step reproduction, impact analysis, and suggested fix (optional). Use the template below.

3

Submit via GitHub Security Advisory

Go to GitHub Security Advisory to submit privately. Alternatively, email security@positronic-ai.network with GPG encryption.

4

Receive Your Reward

After we verify and fix the issue, you'll receive ASF coins to your wallet. Critical fixes may earn additional bonus rewards at our discretion.

📝

Report Template

Title: [Brief description of the vulnerability] Severity: Critical / High / Medium / Low Component: [e.g., consensus/dpos.py, rpc/server.py, crypto/keys.py] Description: [Detailed explanation of the vulnerability and its impact] Steps to Reproduce: 1. [First step] 2. [Second step] 3. [Expected vs actual behavior] Proof of Concept: [Code snippet, script, or logs demonstrating the issue] Impact: [What can an attacker achieve? Fund theft, chain halt, data leak, etc.] Suggested Fix: (Optional) [Your recommendation for fixing the vulnerability] Environment: - OS: [Windows/macOS/Linux] - Python: [version] - Node version: [commit hash or release] - Network: [testnet/local] Wallet Address: [Your Positronic address for reward payment]
🛡

Security Architecture

Positronic implements defense-in-depth security across all layers:

Layer Protection Standard
SignaturesEd25519 (RFC 8032)128-bit security
HashingSHA-512 + Blake2b256-bit security
Key StorageAES-256-GCM encrypted keystorePBKDF2 100K iterations
DatabaseAES-256-GCM encryption at restPBKDF2-SHA512
Admin KeysMachine-bound encrypted storageHMAC-SHA256 auth
P2P TransportTLS 1.3 with certificate pinningForward secrecy
RPC ServerMulti-tier rate limiting + CORS3 sliding windows
Post-QuantumDilithium lattice signaturesNIST PQC Level 3
ConsensusBFT finality + slashing66% Byzantine fault tolerance
AI ValidationML fraud detection pipelineQuarantine + human review

🛡 Safe Harbor Statement

Positronic considers security research conducted in good faith to be authorized activity. We will not pursue legal action against researchers who follow the rules outlined above, test only on testnet infrastructure, make a good faith effort to avoid privacy violations and data destruction, and report vulnerabilities promptly through the designated channels. We ask that you give us reasonable time to address issues before public disclosure.

🛡

Internal Security Audit — v0.3.0

In February 2026, an internal security audit identified and fixed 12 vulnerabilities (3 Critical, 9 High) across the consensus, cryptographic, AI, and infrastructure layers. All fixes are backed by a 218-test attack simulation suite that verifies each defense from a real attacker's perspective.

3
Critical Fixes
9
High Fixes
218
Attack Simulation Tests
6,848
Total Tests Passing