HackenProof Docs
  • Welcome
    • HackenProof
      • Services we provide
      • Our resources
    • Integrations
      • Slack
      • Discord
      • Telegram
      • Zapier (Webhook)
        • Zapier -> Lark
        • Zapier -> Linear
        • Zapier -> Jira Service Management
        • Zapier -> PagerDuty
        • Zapier -> Google Chat
        • Zapier -> ClickUp
      • Jira Software
      • GitHub Issue
      • GitLab Issue
      • VDP iFrame
    • FAQ
      • Audit & Bug Bounty (BB)
      • Crowdsourced Audit & BB
      • Penetration testing & BB
    • Emergency
      • Reset 2FA
    • Code of Conduct
    • Referral Program
  • Bug Bounty
    • Bug Bounty process
    • How to start Bug Bounty
    • How to create a VDP
    • Vulnerability classification
      • Web & Mobile
        • Out-of-Scope Bugs
      • Smart contracts
      • Blockchain protocols
    • Reports Basics
      • Points Guide
      • Crafting a well-readable report
  • Dashboard
    • Company dashboard
      • Manage programs
      • Manage reports
      • Share report
      • Labels
      • E2E report encryption
      • Reports decrypting with Mailvelope
      • Users and roles
      • Program/Report Assignee
      • Replenish your balance
      • Integrations
    • Hacker dashboard
      • 👉How to start
      • Submit a report
      • Reports Basics
      • Vulnerability classification
      • 👮‍♂️KYC
      • Сreate a crypto wallet
      • 💸Withdraw bounty
      • Hacker Leaderboard
      • Reset 2FA
      • 🍕HackenProof community
      • Report ID
      • Private Program
      • Contact support
    • Company-Auditor dashboard
      • How to start
      • Add members
      • Submit report
      • Contact support
  • Crowdsourced audit
    • Audit process
    • How to start Audit
    • Supported tech
    • Vulnerability classification
    • Reports Basics
    • Qualified Auditors
    • Judging / Triaging
      • Targets
      • Team
    • Fee & Payments
  • DualDefense Audit
    • What is DualDefence Audit
    • How DualDefence Audit goes
    • DualDefence Audit — researchers' perspective
  • good to know
    • Changelog
    • Branding
    • Vulnerability Disclosure
  • Education
    • Courses
    • Tools
    • Useful sources
Powered by GitBook
On this page
  1. Bug Bounty
  2. Vulnerability classification

Blockchain protocols

This is a vulnerability classification table for blockchain protocols (v2.0)

PreviousSmart contractsNextReports Basics

Last updated 10 days ago

This classification applies to vulnerabilities that affect the core blockchain protocol or node-level consensus/security.

Severity

Example Vulnerabilities

🔴 Critical

- Direct theft of funds (e.g., ledger corruption, consensus manipulation) - Permanent freezing of funds (irrecoverable protocol-level lock) - Total network shutdown - Network unable to confirm transactions - Resolution requires a hard fork - Consensus Manipulation or Fork Creation: Beyond shutdown, include the risk of chain split or invalid blocks.

🟠 High

- Application-level Denial of Service (DoS) - Causes any node to crash under specific payloads or conditions - Attack can be mitigated via firewall rules - Temporary freezing of network transactions - Temporary freezing of funds (e.g., liveness failure)

🟡 Medium

- Application-level DoS affecting a subset of nodes (non-catastrophic) - Unintended smart contract behavior due to protocol quirks or edge-case consensus rules - Time Manipulation Attacks: Exploiting timestamp dependencies in consensus or smart contract behavior. - Block Reorg Exploits: Minor reorganizations that can affect specific dApps or applications.

🟢 Low

- Shutdown of <25% of network nodes (non-critical, no brute-force) - Transaction fee modification or miscalculation without economic impact - P2P Gossip Layer Issues: e.g., propagation delays, non-malicious message flooding, etc.

If the issue is not under one of the mentioned vulnerabilities, we use the to assess the severity of your vulnerability.

Common Vulnerability Scoring System