-
Notifications
You must be signed in to change notification settings - Fork 5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious Dependency Update Bug Bounty #6699
Comments
Issue Status: 1. Open 2. Started 3. Submitted 4. Done This issue now has a funding of 3000.0 DAI (3000.0 USD @ $1.0/DAI) attached to it.
|
Issue Status: 1. Open 2. Started 3. Submitted 4. Done Work has been started. These users each claimed they can complete the work by 316 years, 10 months from now. 1) fincrypchain001 has started work. COMPLETE SELECT ETHEREUM ADDRES AUTOPAID LAIN TEMPAT SETIAP 50 ETHEREUM 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 TO 0x7BC13FE91B6a355f85c13D8C89108d689c9E6fa7 Make dfrennce Learn more on the Gitcoin Issue Details page. |
Issue Status: 1. Open 2. Started 3. Submitted 4. Done Work has been started. These users each claimed they can complete the work by 313 years, 11 months from now. 1) fincrypchain001 has started work. COMPLETE SELECT ETHEREUM ADDRES AUTOPAID LAIN TEMPAT SETIAP 50 ETHEREUM 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 TO 0x7BC13FE91B6a355f85c13D8C89108d689c9E6fa7 Make dfrennce COMPLETE SELECT ETHEREUM ADDRES AUTOPAID LAIN TEMPAT SETIAP 50 ETHEREUM 0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2 TO 0x7BC13FE91B6a355f85c13D8C89108d689c9E6fa7 Make dfrennce Identify the dependency with malicious code am planning to expand the network in an new era of generations.what are your thoughts on it?? I would like to learn and complete this task. Well, I will take a look and I will start looking for the problem. Find the vulnerabilities packages I guess done with in time hope I will finish this work with in time. щдро згодлрг7щ help 500 dollars my khgvfhjj guinhgfikj cjhru okkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk to sum up the questions by making a generalization, to identify the solutions, and to overcome all the troubles in order. N3 ise yaradığını ne kazandırdığını öğrenmek istiyorum Learn more on the Gitcoin Issue Details page. |
@danfinlay seems you've renewed that issue on Gitcoin. If so, how to get notified about new PRs needed to be checked? |
@agutsal like the parent post says, we're posting pending release candidates to Twitter with metamask_bot. |
Thanks. I'm not big fan of Twitter, that's why been looking for other ways to get notified. Will check now |
You could use IFTTT to message you on another protocol upon our tweets? |
Thanks. I'll think out something better I guess. Circle CI notifications would work better for me |
Is this open still? |
Yes, this bounty is open and available for payout if anyone can identify a malicious dependency. |
Oh I can see why you'd ask, originally this was opened in response to many newly updated dependencies. That said, I think it's safe to leave open, as an encouragement for developers to scrutinize our code-base. |
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
@danfinlay @kumavis @danjm @Gudahtt @whymarrh @Zanibas |
danfinlay never replies nothing, also its impossible to contact metamask team. There is no real bounties here, dont loose your time like i did. |
@AgCaliva thanks. I'll try. The project is actively developed, and I hope someone will reply. |
Thank you for fixing my issue
On Sat, 14 May 2565 BE at 12:38 am, Arsen A. Hutsal < ***@***.***> wrote:
@AgCaliva <https://github.com/AgCaliva> thanks. I'll try. The project is
actively developed, and I hope someone will reply.
—
Reply to this email directly, view it on GitHub
<#6699 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AWVHH4V3TLHUDVO3QGCIDG3VJZSPBANCNFSM4HVZBW2A>
.
You are receiving this because you are subscribed to this thread.Message
ID: ***@***.***>
--
Christina Vongphit iPhone
|
This issue represents the latest bug bounty in the MetaMask bug bounty program.
We will pay out this issue and bounty to any user who is able to identify a dependency update we have merged that includes malicious code designed to illegitimately access user keys.
Since this bounty is only good for code we have merged but not yet deployed, to participate in this program it will be useful to be notified about our latest release candidates before they are published.
We have a new release candidate up with many new dependency updates ([introduced in this PR](I recommend the use of a dependency-diffing tool in particular for finding potential introduced vulnerabilities by this change, like npmfs.)), making it a prime candidate for this bounty. We are keeping this release candidate up for a full week, maximizing the opportunity that this bounty can be filled!:
#6698
NpmFS is a great tool for analyzing the differences between npm modules at two release versions, and could be useful in pursuing this bounty.
We have created a new twitter account, MetaMask Bot, for posting about pending releases, which should also be useful to interested bounty hunters. A simple IFTTT twitter notification can allow you to receive these updates via the messenging platform of your choice.
Happy Hunting!
The text was updated successfully, but these errors were encountered: