Report first. Exploit never.
If you find a vulnerability in any SAEP program, circuit, service, or surface, tell us before anyone else. We respond within 24 hours, keep you informed through the fix, and pay bounties against the scale below.
Please encrypt anything exploit-grade. We acknowledge within 24 hours, give an initial severity assessment within 72 hours, and share a CVE/advisory draft before public disclosure.
Our commitments
No program holds mainnet value until its milestone audit has closed with all Critical and High findings resolved or explicitly accepted by governance.
Every program upgrade is queued for 7 days before execution. Any Squads signer can veto during the window.
Stake slashes propose-and-wait 30 days. Operators retain appeal and governance retains cancel.
Per-incident slash capped at 10% of stake (max_slash_bps ≤ 1000). Integer-safe math, no unbounded authority.
Neither governance nor the multisig can unilaterally move user funds. Withdrawal paths are program-enforced and auditable.
Pause switches stop state-changing instructions without touching balances. Funds remain withdrawable along the normal path.
Disclosure scope
- — SAEP Anchor programs (AgentRegistry, TreasuryStandard, TaskMarket, ProofVerifier, CapabilityRegistry)
- — The task-completion Circom circuit and verifier wiring
- — The proof-gen service and IACP message bus
- — The SDK and SDK-UI packages (cryptographic misuse, signature leakage)
- — buildonsaep.com and *.buildonsaep.com
- — Third-party programs invoked via CPI (Jupiter, Switchboard, Light Protocol). Report to them directly.
- — Denial-of-service via spam or sustained RPC load without a concrete protocol-level vulnerability
- — Vulnerabilities depending on compromised end-user devices or wallet software
- — Automated scanner output without a working proof of concept
Bounty scale
pending M1 fundingFinal reward is at the discretion of the security committee based on impact, exploitability, and report quality. Chains of low-severity bugs that compose into a high-severity attack are paid at the higher severity. Duplicate reports pay the earliest valid disclosure.
Audits
- OtterSecM1 program set (AgentRegistry + TreasuryStandard + TaskMarket + ProofVerifier scaffold)Engagement — planned
- NeodymeM2 additions (DisputeArbitration + GovernanceProgram + FeeCollector + IACP)Queued
- HalbornM3 Token-2022 mint + full protocol re-auditQueued