Eligible Bugs
We reward bugs that could cause outages, state corruption, logic errors, or other security issues on mainnet.
How to Submit
Email your report to [email protected] and include the following:
A clear title describing the issue
Detailed steps to reproduce the bug
Proof of concept (PoC) where possible
Severity assessment (if known)
The first valid and unique report for each issue will be rewarded. Duplicate submissions will not be eligible for a bounty.
Reward Tiers (Paid in USDC)
Rewards are determined by the severity of the vulnerability:
Critical — up to $10,000 (e.g., issues that could lead to loss of user funds)
High — up to $2,000 (e.g., network downtime or outages without incorrect state)
Medium — up to $1,000 (e.g., API or performance degradation that affects security or reliability)
Program Rules
Testing is permitted only on testnet or local forks. Never test on mainnet.
Do not engage in social engineering, phishing, or sustained DDoS attacks.
Do not publicly disclose the vulnerability before it has been fixed and the bounty has been paid.
Exploitation must stay strictly within the scope needed to demonstrate the bug.
KYC verification is required to receive payment.
Not Eligible
The following types of reports will not qualify for rewards:
Vague reports lacking clear reproduction steps or proof of concept
Bugs that require unrealistic user behavior or highly specific market conditions
Issues related to third-party dependencies (unless they are directly exploitable through Temple)
Non-security bugs, such as minor performance issues or UI glitches
Legal Statement
Temple Digital Group will not pursue legal action against researchers who act in good faith and follow these guidelines. All submissions and related information become the property of Temple Digital Group upon submission.
