
BugRugger
134 posts






Our Reserve Contract bug bounty has been live for 3 weeks and so far no critical vulnerabilities have been found. So we’re issuing a new challenge: Break our live test currency and receive $150,000 USD Details below: flipcash.com/blog/reserve-c…












This is either dishonest or obtuse - either way, 100% untrue. This is not an "edge case". Your contract omits checks and balances. Is that an "edge case"? Does security research or your bounty exclude "edge cases" or could that actually be a primary purpose of such work? The way your team talks you need outside help. I have submitted 3 robust exploits and shown in detail how they compound. all are grounded simulations you can run against your own infra instead of publicly inducing illegal behaviour from a researcher. It's fine if you refuse to patch but let this public record stand. If someday your platform fails due to this root cause there will be a full accounting on your head. Your team is not qualified to host your own bounties. Far more qualified and professional teams use proper platforms like @Hacker0x01 who can mediate clearly and honestly instead of "we checked our work and found it was correct". No patch = No Money, is my policy. I don't want money for nothing. The price of each patch is the advertised bounty and not a dollar less if you use it. Not some arbitrary 90% discount you decide retrospectively. If you patch against any of the distinct bug reports without attribution, I will seek legal injunction and remedy. There is more than enough evidence against @flipcash who have clearly acted in bad faith. Have a competent external engineer or auditor look at the proof since you have none internally. I will publicly retract all of my statements and apologise if a neutral professional disproves this exploit. Since you're happy to throw away 10k when a patch "isn't needed" you should commit that 10k publicly to audit this exploit. You like win-win? You can only win by exposing me as a fraud - showing the world how robust your contract is; or confirming that your contract has a bug and fixing it. If any exploit holds you should respect your users by patching and pay the relevant bounty in full. Since you like to tag your friends, let's hope @mert @rajgokal @toly see what you are really up to.

I highly recommend projects don’t accept outside PRs and instead tell their Claude to audit it, verify the bug is real via test driven development and implement the fix locally.




The good news is @flipcash and @ted_livingston ran my exploit and validated it themselves. The bad news is they didn't bother to report or update their community. Here's my report. The on-chain data means anybody can verify via solanafm, solscan, etc: gist.github.com/bugruggr/dda50…




