Community Voting

Help validate bug submissions by voting with your BUG3 tokens. Your expertise shapes the quality of our security ecosystem.

250

Your Voting Power

2

Active Votes

1

Your Votes Cast

306

Total Community Votes

CriticalVoting Active

Critical Reentrancy in withdraw() function

Bounty: Smart Contract Reentrancy Vulnerability Assessment

Discovered a critical reentrancy vulnerability in the withdraw function that allows attackers to drain the contract balance. The function updates the user balance after transferring funds, creating a window for recursive calls.

2500 USDC

Potential Reward

Researcher: 0xabc123...def456
5 days left
150 total votes

Evidence Files:

📎 reentrancy-poc.sol📎 exploit-test.js📎 transaction-logs.txt
Community Consensus85% approval
👍 128 approve👎 22 reject
MediumVoting Active

SQL Injection in search endpoint

Bounty: API Security Audit

Discovered SQL injection vulnerability in the /api/search endpoint. User input is not properly sanitized before being used in database queries.

500 DAI

Potential Reward

Researcher: 0x456def...abc789
2 days left
67 total votes

Evidence Files:

📎 sql-injection-poc.py📎 database-dump.txt
Community Consensus34% approval
👍 23 approve👎 44 reject

How Community Voting Works

1

Stake BUG3 Tokens

Stake your BUG3 tokens to earn voting power and participate in governance.

2

Review & Vote

Carefully review bug submissions and vote to approve or reject based on quality.

3

Earn Rewards

Gain reputation and earn additional BUG3 tokens for accurate voting decisions.