Aurora pays $6M bug bounty to ethical security hacker through Immunefi
Cross-chain communication procedures are a prime target for hackers, in spite of being innovative. Among the most considerable decentralized finance hacks was the February Wormhole token bridge theft of more than $321 million in digital possessions. This happened after hackers exploited a limitless minting bug in between the Wormhole token pool and its wrapped ETH.
Check out More
One week prior to finding the vulnerability, Aurora had created a bug bounty program in combination with Immunefi. Frank Braun, the head of security at Aurora Labs commented that the bug bounty program was the last step in a multilayered defense strategy and that it will be utilized as an opportunity to enhance on earlier steps like internal reviews or external audits.
Immunefi was notified by pwning.eth on April 26th of a vital flaw discovered in the Aurora Engine. This would have permitted the infinite minting and siphoning of ETH from the Aurora Ethereum Virtual Machine. The pool deserved more than 70,000 ETH at the time of discovery. It is approximated to be worth at least $200million.
The Aurora (ETH) bridging, scaling and service for Ethereum (ETH), announced Tuesday that it had paid out a $6,000,000 bounty to pwning.eth an ethical security hacker who found a critical defect in the Aurora Engine. Over $200 million of capital was at danger due to the exploit. This amount was paid in partnership by Immunefi. Immunefi is a leader platform for Web 3.0 bug bounty programs. There are more than $145million bounties and over $45million paid.
The Aurora (ETH) bridging, scaling and service for Ethereum (ETH), revealed Tuesday that it had actually paid out a $6,000,000 bounty to pwning.eth an ethical security hacker who found a crucial defect in the Aurora Engine. One week prior to finding the vulnerability, Aurora had developed a bug bounty program in conjunction with Immunefi. Frank Braun, the head of security at Aurora Labs commented that the bug bounty program was the last action in a multilayered defense method and that it will be used as a chance to improve on earlier steps like internal evaluations or external audits.
Join Thousands of Early Adopters Just Like You Who Want to Grow Capital and Truly Understand Cryptocurrency Together