GMX, a decentralized change, awarded Collider Analysis a $1 million bug bounty in 2022. This payout was in recognition of their discovery of a important bug in GMX’s good contracts that instantly affected how the protocol tracks excellent debt.
The Bug Affecting GMX And GLP
GMX has not supplied extra info on how the bug was patched and when. Nevertheless, the DEX operator stated the bug negatively impacted GMX v1 liquidity suppliers (LPs) because the code led to inaccuracies in quotes associated to “the honest worth of tokens.” Particularly, the bug affected the World Liquidity Pool (GLP), inflicting it to deviate from its honest worth.
Since GMX helps as much as 50X leverage, a system tracks debt borrowed by merchants and the way it’s repaid. It’s good contract-driven, and the dealer enters into debt for each leveraged place. If costs transfer towards them, they’re liquidated, and the margin securing the leveraged place is transferred to the protocol.
Any disruption to this mechanism can severely have an effect on GMX, impacting income and disincentivizing liquidity suppliers from participating.
In September 2022, a flaw affecting GLP and impacting the DEX’s “minimal payment” and “zero value impression” options noticed an unidentified exploiter make manner with over $570,000 from the AVAX/USD market.
By deploying on Arbitrum, a layer-2, and Avalanche, a excessive throughput and low-fee blockchain, the protocol helps low-fee swapping powered by GLP, a liquidity pool holding all belongings traded on GMX. From the GLP, liquidity suppliers who might have been considerably impacted can earn charges from swap charges, spreads from leverage buying and selling, and each time there may be asset rebalancing.
Bounty Program Can Reward Up To $5 Million
Additional particulars present that GMX’s bug bounty program focuses on making certain their good contracts and software perform as designed with out weak point, contemplating the trustless nature of swaps. The purpose is to forestall theft of consumer funds by varied means, together with unauthorized transfers, value manipulation of GLP, freezing, and different menace vectors.
Every time there’s a flaw, and the white hacker identifies it, the GMX bug bounty program will distribute rewards relying on the flaw’s severity. Nevertheless, any submission should accompany a report demonstrating how the code error impacts the protocol earlier than being reviewed and the reward distributed.
Even so, in GMX, all important good contract vulnerabilities are topic to a ten% cap on the potential injury it might have induced. The utmost bounty paid to builders who pick important code flaws is $5 million.
Characteristic picture from Canva, chart from TradingView