Saturday, June 14, 2025
HomeBug BountyUniswap Labs to Offer $15.5 Million Bounty for Bug Hunters

Uniswap Labs to Offer $15.5 Million Bounty for Bug Hunters

Published on

SIEM as a Service

Follow Us on Google News

Uniswap Labs has launched a $15.5 million bug bounty program to ensure the security of its latest protocol, Uniswap v4.

This substantial bounty is the largest ever offered in the history of the DeFi sector. Uniswap v4 represents the latest evolution of the Uniswap Protocol, marking a significant transformation into a comprehensive developer platform.

This iteration introduces “hooks,” enabling developers to create customizable contracts that dictate interactions between pools, swaps, fees, and liquidity provider (LP) positions.

- Advertisement - Google News

The introduction of hooks is set to unlock new market structures and broaden the range of assets available on the platform, thereby serving more users effectively.

Aside from the technological advancements, Uniswap v4 promises cost efficiency, with pool creation costs expected to be reduced by 99.99% and notable savings on multi-hop swaps for traders.

Developed with a collaborative spirit, the v4 codebase has been shaped by contributions from over 90 developers and hundreds of community pull requests.

Analyze cyber threats with ANYRUN's powerful sandbox. Black Friday Deals : Get up to 3 Free Licenses.

A Focus on Security

Security is a paramount concern for Uniswap Labs, which is underscored by the rigorous code reviews and audits that Uniswap v4 has undergone.

The protocol has been scrutinized through nine independent audits by industry-leading firms like OpenZeppelin, Spearbit, and Certora.

Additionally, a $2.35 million security competition was held, engaging over 500 researchers, with no critical vulnerabilities discovered to date.

The launch of the $15.5 million bug bounty aims to further fortify the protocol’s security ahead of its deployment.

By inviting ethical hackers and developers to examine the Uniswap v4 core contracts, Uniswap Labs is taking proactive steps to ensure any potential vulnerabilities are identified and addressed promptly.

The bug bounty encompasses vulnerabilities within the Uniswap v4 core contracts, accessible through the project’s GitHub repository.

However, it excludes third-party contracts not deployed by Uniswap Labs, previously identified issues in audits, and third-party applications utilizing Uniswap contracts. The periphery contracts of Uniswap v4 will be added to the program shortly.

To participate, bug hunters must submit their findings via the v4 Bug Bounty Page on Cantina within 24 hours of discovery, ensuring confidentiality until any issues are resolved.

Detailed reports, including reproduction steps and possible implications, increase the likelihood of eligibility for a reward. Successful contributors can opt for public recognition for their discoveries.

The $15.5 million bug bounty program is live, inviting the global community of developers and researchers to explore the v4 codebase.

Interested participants can find further details and submission requirements on the v4 Bug Bounty Page on Cantina. This initiative underscores Uniswap’s commitment to security and innovation in the rapidly evolving DeFi landscape.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...