diff --git a/README.md b/README.md index ea3bfc8..07f6e66 100644 --- a/README.md +++ b/README.md @@ -1,19 +1,34 @@ -## DODO CrowdPoolingV2 Audit Scope +# DODO V2: Help 1 Trillion People Issue Token -- contracts/CrowdPooling/impl/CP.sol -- contracts/CrowdPooling/impl/CPFunding.sol -- contracts/CrowdPooling/impl/CPStorage.sol -- contracts/CrowdPooling/impl/CPVesting.sol +## Audit Report -*Note: CrowdPoolingV2 && CrowdPoolingV1 code diff* +[Audited by Peckshield](https://github.com/DODOEX/contractV2/blob/main/audit/PeckShield-Audit-DODOV2-v1.0.pdf) -- [https://github.com/DODOEX/contractV2/blob/starter/cpV2&&cpV1-diff.html](https://github.com/DODOEX/contractV2/blob/starter/cpV2&&cpV1-diff.html) +## Bug Bounty 💰 -## DODO Starter Audit Scope +### Rewards -- contracts/DODOStarter/impl/FairFunding.sol -- contracts/DODOStarter/impl/InstantFunding.sol -- contracts/DODOStarter/impl/Storage.sol -- contracts/DODOStarter/impl/Vesting.sol -- contracts/Factory/DODOStarterFactory.sol -- contracts/SmartRoute/proxies/DODOStarterProxy.sol \ No newline at end of file +Severity of bugs will be assessed under the [CVSS Risk Rating](https://www.first.org/cvss/calculator/3.0) scale, as follows: + + - Critical (9.0-10.0): Up to $100,000 + - High (7.0-8.9): Up to $10,000 + - Medium (4.0-6.9): Up to $5,000 + - Low (0.1-3.9): Up to $1,000 + +In addition to assessing severity, rewards will be considered based on the impact of the discovered vulnerability as well as the level of difficulty in discovering such vulnerability. + +### Disclosure + +Any vulnerability or bug discovered must be reported only to the following email: contact@dodoex.io; must not be disclosed publicly; must not be disclosed to any other person, entity or email address prior to disclosure to the contact@dodoex.io email; and must not be disclosed in any way other than to the contact@dodoex.io email. In addition, disclosure to contact@dodoex.io must be made promptly following discovery of the vulnerability. Please include as much information about the vulnerability as possible, including: + + - The conditions on which reproducing the bug is contingent. + - The steps needed to reproduce the bug or, preferably, a proof of concept. + - The potential implications of the vulnerability being abused. + +A detailed report of a vulnerability increases the likelihood of a reward and may increase the reward amount. + +Anyone who reports a unique, previously-unreported vulnerability that results in a change to the code or a configuration change and who keeps such vulnerability confidential until it has been resolved by our engineers will be recognized publicly for their contribution, if agreed. + +## Contact Us + +Send E-mail to contact@dodoex.io \ No newline at end of file