Protect Privacy.Earn ZEC.
Find vulnerabilities in Zcash privacy-critical infrastructure.
OWASP Risk Rating · Coordinated disclosure · Shielded Z-address required.
Turns luck into structure.
In March 2026, a critical bug was found and fixed in 3 days with no exploitation. It worked — because one person happened to have good character. This program makes sure the next time doesn't depend on luck.
Sprout Pool Vulnerability— March 2026
The first officially recognized bounty. AI-assisted discovery, responsible private disclosure, 3-day coordinated patch across all major mining pools. Proof the system works.
Scalar identified a critical vulnerability in zcashd v3.1.0 through v6.11.x— nodes were silently skipping Sprout proof verification when connecting new blocks to the chain. The bug had existed for nearly 6 years, introduced by a fCheckedflag optimization inherited from Bitcoin Core that interacted incorrectly with Zcash's two-pass validation logic. Scalar did not request a bounty or mention money. With assistance from David Burkett (Litecoin MWEB Developer) on responsible disclosure, the report reached Shielded Labs privately with zero public exposure.
A malicious miner could have exploited this to drain the approximately 25,424 ZECheld in the deprecated Sprout pool. Zcash's turnstile mechanism would have prevented any supply inflation, and user privacy was never at risk — but funds were exposed. Patch authored by Jack Grigg (str4d), reviewed by Daira-Emma Hopwood and Kris Nuttycombe(ZODL). Deployed across all major mining pools — Luxor, F2Pool, AntPool, ViaBTC— within 72 hours of disclosure.
Zebra, the Zcash Foundation's full node implementation, was never affected. Had exploitation been attempted, Zebra would have triggered a detectable chain fork — a critical layer of defense that worked exactly as designed. Shielded Labs, ZODL, Zcash Foundation, and Bootstrap each awarded 50 ZEC in gratitude for protecting Zcash users.
- Jul 2020Bug silently introduced in zcashd v3.1.0 —
fCheckedflag optimization causes Sprout proof verification to be skipped during block connection. - Jun 2023Zebra 1.0.0 goes live on mainnet, correctly verifying all transactions — becoming a critical safety net.
- Mar 23Scalar privately reports the vulnerability to Shielded Labs. No public disclosure, no mention of reward.
- Mar 24Shielded Labs convenes with ZODL engineers. Patch authored by str4d, reviewed by Daira-Emma Hopwood and Kris Nuttycombe. ViaBTC, Luxor, F2Pool contacted.
- Mar 25–26All 4 major pools (ViaBTC, Luxor, F2Pool, AntPool) confirm patch deployment. Zero exploitation window.
- Mar 31zcashd v6.12.0 released publicly. Coordinated disclosure posted by Zooko on Zcash Community Forum.
— Community member, Zcash Forum
Program launched March 2026 — submit a valid report to join the Hall of Fame.
Payout Structure
All rewards paid in ZEC to a shielded Orchard address. Amounts scored using the OWASP Risk Rating Methodology. Maximum reward: $30,000 USD in ZEC for critical findings, contributed jointly by 4 participating organizations.
RCE, consensus failure, catastrophic privacy breach, shielded pool drain, or ZKP forgery. Full-chain threat with maximum impact and high exploitability.
Significant privacy or security vulnerability with broad impact. Orchard/Sapling protocol issues or wallet key exposure under exploitable conditions.
Limited privacy impact, DoS, or transaction malleability that doesn’t break consensus. Partial anonymity set reduction.
Minor issues with negligible security impact. Best-practice violations or informational disclosures with very limited attack surface.
Informational findings, best-practice suggestions, or hardening recommendations with no direct security impact.
OWASP Risk Rating Methodology
Every submission is scored on two axes — Likelihood and Impact — each from 0 to 9. The product determines severity and reward tier.
- Skill Level0–9
- Motive0–9
- Opportunity0–9
- Size of group0–9
- Ease of Discovery0–9
- Ease of Exploit0–9
- Awareness0–9
- Intrusion Detection0–9
- Loss of Confidentiality0–9
- Loss of Integrity0–9
- Loss of Availability0–9
- Loss of Accountability0–9
- Financial Damage0–9
- Reputation Damage0–9
- Non-Compliance0–9
- Privacy Violation0–9
Severity Matrix — Likelihood (rows) × Impact (columns)
| ⬡ IMPACT | |||
|---|---|---|---|
| ◈ LIKELIHOOD | LOW (0–3) | MEDIUM (3–6) | HIGH (6–9) |
| HIGH (6–9) | MEDIUM | HIGH | CRITICAL |
| MEDIUM (3–6) | LOW | MEDIUM | HIGH |
| LOW (0–3) | NOTE | LOW | MEDIUM |
Real Example — Scalar's Sprout Bug (Mar 2026)
Responsible Disclosure Policy
Noble disclosure requires controlled timing. Premature publication helps attackers, not users. We provide a structured path that protects both the researcher and the ecosystem.
Latest News
Security advisories and program updates.
Program Rules
Follow responsible disclosure practices. Violations may disqualify your submission. AI-assisted discovery is explicitly welcome.
Submit a Vulnerability
Reviewed within 5 business days. AI-assisted discovery explicitly welcome.
Crosslink repositories are out of scope.
Prototype / testnet only. No Crosslink repository qualifies for bug bounty rewards.
No payouts are issued for Crosslink bugs.
If your report is for Zcash Foundation infrastructure or Zebra, do not use this form. Please open a private security advisory issue instead.
Open private advisory issue ↗