Bug Bounty Program Fails to Respond to High-Severity Security Vulnerability Report
A critical security vulnerability report submitted to a bug bounty program has gone unacknowledged and unresolved for an extended period, raising significant concerns about the program's operational integrity and the security of the underlying system. The report, which includes payout addresses for multiple blockchains (EVM, SOL, RTC), indicates a researcher is awaiting a response and potential reward for a flaw serious enough to warrant a bounty. The prolonged silence suggests a potential breakdown in the vulnerability disclosure process, leaving a known security risk unaddressed.
The core of the issue appears to be a technical flaw related to lock acquisition, specifically involving deadlock, livelock, and stale lock conditions within a system's `acquireLock` function. While a subsequent code fix was implemented—introducing an exponential backoff retry strategy and simplifying internal logic—the timeline indicates this technical remediation occurred without proper engagement with the original reporter. This disconnect between internal development and external security reporting channels is a major red flag.
This failure to respond places the organization running the bug bounty program under intense scrutiny. It undermines trust with the security research community, potentially discouraging future responsible disclosure and leaving the door open for exploits. The situation highlights a critical operational risk: a bug bounty program is only as effective as its response mechanism. Persistent unresponsiveness to high-severity issues could signal deeper internal failures in security governance, resource allocation, or crisis management protocols, exposing the organization to reputational damage and unmitigated security threats.