Protect Privacy.Earn ZEC.
Find vulnerabilities in Zcash privacy-critical infrastructure.
OWASP
Risk Rating · Coordinated disclosure · Shielded Z-address required.
Turns luck into structure.
In March 2026, a critical bug was found and fixed in 3 days with no exploitation. It worked — because one person happened to have good character. This program makes sure the next time doesn't depend on luck.
Sprout Pool Vulnerability — March 2026
The first officially recognized bounty. AI-assisted discovery, responsible private disclosure, 3-day coordinated patch across all major mining pools. Proof the system works.
Scalar identified a critical vulnerability in
zcashd v3.1.0 through v6.11.x — nodes were
silently skipping Sprout proof verification when connecting new
blocks to the chain. The bug had existed for nearly 6 years,
introduced by a fChecked flag optimization
inherited from Bitcoin Core that interacted incorrectly with
Zcash's two-pass validation logic.
A malicious miner could have exploited this to drain the approximately 25,424 ZEC held in the deprecated Sprout pool. Zcash's turnstile mechanism would have prevented any supply inflation, and user privacy was never at risk — but funds were exposed. The patch was deployed across all major mining pools within 72 hours of disclosure.
Zebra, the Zcash Foundation's full node implementation, was never affected. Had exploitation been attempted, Zebra would have triggered a detectable chain fork — a critical layer of defense that worked exactly as designed.
-
Jul 2020Bug silently introduced in zcashd v3.1.0 —
fCheckedflag optimization causes Sprout proof verification to be skipped during block connection. - Jun 2023Zebra 1.0.0 goes live on mainnet, correctly verifying all transactions — becoming a critical safety net.
- Mar 23Scalar privately reports the vulnerability to Shielded Labs. No public disclosure, no mention of reward.
- Mar 24Shielded Labs convenes with ZODL engineers. Patch authored by str4d, reviewed by Daira-Emma Hopwood and Kris Nuttycombe. ViaBTC, Luxor, F2Pool contacted.
- Mar 25–26All 4 major pools (ViaBTC, Luxor, F2Pool, AntPool) confirm patch deployment. Zero exploitation window.
- Mar 31zcashd v6.12.0 released publicly. Coordinated disclosure posted by Zooko on Zcash Community Forum.
— Community member, Zcash Forum
Program launched March 2026 — submit a valid report to join the Hall of Fame.
Payout Structure
All rewards paid in ZEC to a shielded Orchard address. Amounts scored using the OWASP Risk Rating Methodology. Highest reward paid to date: 200 ZEC.
RCE, consensus failure, catastrophic privacy breach, shielded pool drain, or ZKP forgery. Full-chain threat with maximum impact and high exploitability.
Significant privacy or security vulnerability with broad impact. Orchard/Sapling protocol issues or wallet key exposure under exploitable conditions.
Limited privacy impact, DoS, or transaction malleability that doesn't break consensus. Partial anonymity set reduction.
Minor issues with negligible security impact. Best-practice violations or informational disclosures with very limited attack surface.
OWASP Risk Rating Methodology
Every submission is scored on two axes — Likelihood and Impact — each from 0 to 9. The product determines severity and reward tier.
- Skill Level0–9
- Motive0–9
- Opportunity0–9
- Size of group0–9
- Ease of Discovery0–9
- Ease of Exploit0–9
- Awareness0–9
- Intrusion Detection0–9
- Loss of Confidentiality0–9
- Loss of Integrity0–9
- Loss of Availability0–9
- Loss of Accountability0–9
- Financial Damage0–9
- Reputation Damage0–9
- Non-Compliance0–9
- Privacy Violation0–9
Severity Matrix — Likelihood (rows) × Impact (columns)
| ⬡ IMPACT | |||
|---|---|---|---|
| ◈ LIKELIHOOD | LOW (0–3) | MEDIUM (3–6) | HIGH (6–9) |
| HIGH (6–9) | MEDIUM | HIGH | CRITICAL |
| MEDIUM (3–6) | LOW | MEDIUM | HIGH |
| LOW (0–3) | NOTE | LOW | MEDIUM |
Real Example — Scalar's Sprout Bug (Mar 2026)
Responsible Disclosure Policy
Noble disclosure requires controlled timing. Premature publication helps attackers, not users. We provide a structured path that protects both the researcher and the ecosystem.
Latest News
Security advisories and program updates.
Program Rules
Follow responsible disclosure practices. Violations may disqualify your submission. AI-assisted discovery is explicitly welcome.
Scope
Only vulnerabilities in the systems listed below are eligible for rewards.
- +zcashd v6.12.0+ — core node
- +librustzcash — Rust cryptographic libraries
- +Orchard shielded protocol & circuit
- +Sapling shielded protocol
- +Halo 2 proving system
- +Zebra — Zcash Foundation full node
- +bountyzcash.org, z.cash, zodl.com
- +Zcash protocol specification
- –Third-party wallets (ZecWallet, Nighthawk)
- –Exchanges listing ZEC
- –Social engineering / phishing attacks
- –Physical attacks on infrastructure
- –Previously known and reported issues
- –Sprout pool (deprecated, closed to deposits)
- –DoS / spam without security impact
- –Self-XSS without meaningful attack surface
Submit a Vulnerability
Encrypted and confidential. Reviewed by the triage panel within 5 business days. AI-assisted discovery explicitly welcome.