[ad_1]
The Protocol Security Research Team and the Ecosystem Funding Initiative on the Ethereum Basis are happy to announce the launch of the first Ethereum protocol Attackathon with a reward pool of $1,500,000, hosted by Immunefi. The attackathon runs between November twenty fifth and January twentieth and goals to reinforce the safety of the Ethereum protocol via a large-scale crowdsourced safety audit competitors.
We invite your entire Ethereum neighborhood — from auditing companies to particular person safety researchers — to take part on this essential occasion to assist safe the Ethereum Protocol.
You will get began in your journey into understanding the Ethereum Protocol by way of stay and pre-recorded technical walkthroughs via the Academy.
The Attackathon is co-sponsored by:
- Bybit
- Wormhole
- Arbitrum
- The Graph
- GMX
- Base
What’s an Attackathon?
The Attackathon is a time-bound audit problem to bolster the safety of the Ethereum protocol. It begins with an academic part the place contributors obtain instruction on the protocol’s code by way of stay technical walkthroughs and academic content material from the Attackathon Academy. This part ensures that contributors are well-prepared to determine and perceive potential vulnerabilities.
Through the Attackathon, safety researchers will actively seek for vulnerabilities within the protocol’s code. They’ll comply with particular guidelines set for the competitors, and solely impactful and rule-compliant reviews will probably be rewarded. This part focuses on real-time problem-solving and making use of the information gained in the course of the preliminary part.
After the Attackathon, Immunefi will consider and compile the findings into an official report. This report will element the vulnerabilities found and spotlight the highest researchers, celebrating their contributions and experience.
Taken with working full time in Public Good Safety?
The Ethereum Basis’s Protocol Safety Analysis workforce is now on the lookout for two Safety Engineers: Apply
[ad_2]
Source link