- recommended size:
8 - phase: private protocol bounty
Choose for:
- protocol exploit quality
- discretion and professionalism
- strong reproduction quality
- ability to work privately during testnet and mainnet hardening
- coverage across critical protocol domains
Avoid:
- low-signal report volume without protocol depth
- researchers focused mainly on generic web findings
- researchers with poor communication or disclosure discipline
| Slot | Coverage area | Researcher | Handle / contact | Why this person | Status |
|---|---|---|---|---|---|
| 1 | Protocol / consensus | ||||
| 2 | Protocol / consensus | ||||
| 3 | Rust / systems security | ||||
| 4 | Rust / systems security | ||||
| 5 | Smart contracts / bridge | ||||
| 6 | Smart contracts / bridge | ||||
| 7 | TEE / attestation / enclave | ||||
| 8 | Validator / networking / ops |
For each invited researcher:
- confirm protocol-relevant background
- confirm private disclosure discipline
- confirm preferred payout rail and jurisdiction constraints
- confirm secure reporting path
- record invite date and response