Bug Reporting

Security is fundamental to Altitude. We welcome security researchers and advanced users to examine our systems and responsibly disclose any vulnerabilities you discover. When you help protect our users, we aim to recognise that contribution through public thanks and, where appropriate, a bug bounty reward.

If you believe you’ve found a security issue, please review the guidelines below before submitting a report.

How to Report

Send all reports to [email protected] and include:

  • A clear summary of the issue

  • Exact affected contracts or components (addresses, repos, commit hashes)

  • Impact analysis (potential attacker capabilities, affected users, maximum loss)

  • A minimal reproducible proof-of-concept (tests, scripts, tx traces)

  • Any potential mitigations you recommend

When performing research:

  • Do not exploit vulnerabilities on mainnet or production

  • Do not access, modify, or exfiltrate other users’ data

  • Do not attempt denial-of-service attacks

  • Do not engage in social engineering of Altitude team members or users

If unsure, contact us before taking any risky action.

In-Scope Vulnerabilities

We primarily reward findings that could lead to a loss of funds, loss of control, or material risk to Altitude users or the protocol. Some examples;

  • Logic errors leading to loss, theft, freezing, or mis-accounting of funds

  • Access control failures or privilege escalation

  • Unsafe upgrade patterns or incorrect assumptions in integrations

  • Issues arising from Altitude’s integration with external protocols where the flaw is in Altitude’s logic or assumptions

When in doubt, report the issue. If it has real security impact, we will triage it.

Out-of-Scope Vulnerabilities

To maintain a high-signal program, the following categories are explicitly out of scope and not eligible for bounty rewards.

  • Duplicates of earlier submissions

  • Any known issues listed in either the documentation, repository or previous audit reports

  • Issues requiring deployment from a non-trusted source

  • Typos, documentation, cosmetic UI issues, visual bugs without security impact

  • Vulnerabilities that depend on compromising the user before interacting with Altitude

  • Issues solely arising from third-party protocol bugs, where Altitude behaves according to the documented interface

  • Theoretical attacks requiring unrealistic assumptions, such as:

    • Economic manipulation beyond plausible conditions

    • Guaranteed MEV/control of transaction ordering

    • Compromise of privileged keys or systems we assume secure

  • Gas optimizations or micro-efficiency improvements

Rewards & Recognition

Eligible submissions may receive a monetary bounty based on:

  • Severity: impact and likelihood

  • Novelty: not a duplicate or known issue

  • Quality: clarity, reproducibility, and depth of analysis

With your consent, we may also credit you publicly. All reward decisions are made at the discretion of the Altitude team.

Safe Harbour

If you follow this policy in good faith:

  • We will not pursue legal action for your security research on Altitude

  • We will treat your report confidentially until a fix is deployed

  • We will communicate clearly throughout the disclosure process

We ask that you respect our users, limit your testing to what is necessary, and avoid causing harm or disruption.

Last updated

Was this helpful?