{"id":10104,"date":"2025-03-23T02:26:24","date_gmt":"2025-03-23T01:26:24","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=10104"},"modified":"2025-03-23T02:26:24","modified_gmt":"2025-03-23T01:26:24","slug":"juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/","title":{"rendered":"Jutta&#8217;s Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits"},"content":{"rendered":"<p><\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\">Hello, <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/twitter.com\/tajukahe\">Jutta<!-- --><\/a> back again \u2013 I first presented myself when we initiated the bounty program earlier this year and I&#8217;m pleased to share an update regarding the security aspects before and during the launch.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">We have received some outstanding submissions from bounty hunters \u2013 hats off for the inventive exploits contributed due to the vulnerabilities identified. The quantity of submissions has recently increased. Therefore, we have decided to announce that we will extend the bounty program at least for the entirety of the Frontier phase of Ethereum\u2019s launch strategy \u2013 refer to <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2015\/03\/02\/gavs-ethereum-dev-update-v\">Gav&#8217;s<!-- --><\/a> and <!-- --><a class=\"chakra-link css-ug8vf0\" href=\"https:\/\/blog.ethereum.org\/2015\/03\/03\/ethereum-launch-process\">Vinay&#8217;s<!-- --><\/a> respective blog posts.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">For additional details regarding the bounty program, please visit our <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/bounty.ethdev.com\/\">bounty site<!-- --><\/a> and ensure to check our lead hunter\u2019s repository <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/github.com\/jonasnick\/eth-neg-value-tx\">here<!-- --><\/a> for useful testing scripts before you commence your hunt.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">We not only depend on individual bug hunters and the community: in collaboration with EthDev\u2019s \u00a0<!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/github.com\/Gustav-Simonsson\/\">Gustav Simonsson<!-- --><\/a>,\u00a0I initiated the process of selecting professional security specialists, scholars, and blockchain authorities for our external security audits late last year. Gustav is currently collaborating with auditors and the Ethereum Go development team to monitor all security concerns marked <!-- --><a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-ug8vf0\" href=\"https:\/\/github.com\/ethereum\/go-ethereum\/labels\/vuln\">here<!-- --><\/a> and to devise solutions for them. We intend to maintain a precise record of all issues, closing them only once they are completely addressed and mitigations adequately tested. Each vulnerability discovered is addressed and will be remedied prior to the Frontier release. Feel free to follow us on GitHub if you wish to stay updated on the progress.<!-- --><\/p>\n<p><!-- --><\/p>\n<p class=\"chakra-text css-gi02ar\">The initial phase of contributions from security auditors will conclude in a few weeks, and bug remediation is already well in progress. Resolving all issues will take as long as necessary. This process is driven by security rather than a timeline, after all.<!-- --><\/p>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2015\/03\/20\/juttas-update-bug-bounty-program-security-audit\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello, Jutta back again \u2013 I first presented myself when we initiated the bounty program earlier this year and I&#8217;m pleased to share an update regarding the security aspects before and during the launch. We have received some outstanding submissions from bounty hunters \u2013 hats off for the inventive exploits contributed due to the vulnerabilities<\/p>\n","protected":false},"author":3,"featured_media":8282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[1812],"class_list":{"0":"post-10104","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-juttas-update-on-bug-bounty-program-and-security-audit"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Jutta&#039;s Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jutta&#039;s Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"Hello, Jutta back again \u2013 I first presented myself when we initiated the bounty program earlier this year and I&#8217;m pleased to share an update regarding the security aspects before and during the launch. We have received some outstanding submissions from bounty hunters \u2013 hats off for the inventive exploits contributed due to the vulnerabilities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-23T01:26:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2100\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/\",\"name\":\"Jutta's Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"datePublished\":\"2025-03-23T01:26:24+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg\",\"width\":2100,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jutta&#8217;s Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jutta's Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/","og_locale":"it_IT","og_type":"article","og_title":"Jutta's Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto","og_description":"Hello, Jutta back again \u2013 I first presented myself when we initiated the bounty program earlier this year and I&#8217;m pleased to share an update regarding the security aspects before and during the launch. We have received some outstanding submissions from bounty hunters \u2013 hats off for the inventive exploits contributed due to the vulnerabilities","og_url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/","og_site_name":"WSJ-Crypto","article_published_time":"2025-03-23T01:26:24+00:00","og_image":[{"width":2100,"height":900,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","type":"image\/jpeg"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/","url":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/","name":"Jutta's Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","datePublished":"2025-03-23T01:26:24+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2025\/02\/eth-org.jpeg","width":2100,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2025\/03\/23\/juttas-insights-on-the-latest-developments-in-bug-bounty-initiatives-and-security-audits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Jutta&#8217;s Insights on the Latest Developments in Bug Bounty Initiatives and Security Audits"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10104","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=10104"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10104\/revisions"}],"predecessor-version":[{"id":10106,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/10104\/revisions\/10106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/8282"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=10104"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=10104"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=10104"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}