How to Launch a Web3 Bug Bounty Program: Immunefi, HackerOne, and Best Practices
Over $100M was paid to white-hat hackers in 2025 through bug bounty programs. This guide covers platform selection (Immunefi vs HackerOne vs Code4rena vs Sherlock), reward structures from $500 to $10M+, scope definition, triage workflows, legal frameworks, and ROI calculations for launching your Web3 bug bounty program.
How to Launch a Web3 Bug Bounty Program: Immunefi, HackerOne, and Best Practices
The Web3 security landscape changed permanently in 2025. Over $100 million was paid out to white-hat hackers through bug bounty programs, while exploits still drained $1.7 billion from protocols that lacked adequate security measures. If you are building on-chain, a bug bounty program is no longer optional β it is a fundamental component of your security stack, sitting alongside audits, formal verification, and monitoring.
This guide covers everything you need to launch an effective Web3 bug bounty program in 2026: platform selection, reward structures, scope definition, triage workflows, legal frameworks, and ROI calculations backed by real case studies.
Why Bug Bounties Matter in Web3
Traditional software can push patches in hours. Smart contracts managing hundreds of millions in TVL cannot. Once deployed, vulnerabilities become permanent attack surfaces unless caught early. Bug bounties create a continuous security layer that audits alone cannot provide.
How to Launch a Web3 Bug Bounty Program: Immunefi, HackerOne, and Best Practices
Over $100M was paid to white-hat hackers in 2025 through bug bounty programs. This guide covers platform selection (Immunefi vs HackerOne vs Code4rena vs Sherlock), reward structures from $500 to $10M+, scope definition, triage workflows, legal frameworks, and ROI calculations for launching your Web3 bug bounty program.
How to Launch a Web3 Bug Bounty Program: Immunefi, HackerOne, and Best Practices
The Web3 security landscape changed permanently in 2025. Over $100 million was paid out to white-hat hackers through bug bounty programs, while exploits still drained $1.7 billion from protocols that lacked adequate security measures. If you are building on-chain, a bug bounty program is no longer optional β it is a fundamental component of your security stack, sitting alongside audits, formal verification, and monitoring.
This guide covers everything you need to launch an effective Web3 bug bounty program in 2026: platform selection, reward structures, scope definition, triage workflows, legal frameworks, and ROI calculations backed by real case studies.
Why Bug Bounties Matter in Web3
Traditional software can push patches in hours. Smart contracts managing hundreds of millions in TVL cannot. Once deployed, vulnerabilities become permanent attack surfaces unless caught early. Bug bounties create a continuous security layer that audits alone cannot provide.
β’Immunefi alone facilitated over $100 million in bounty payouts through 2025, preventing an estimated $25 billion in potential losses
β’The average cost of a DeFi exploit in 2025 was $12.3 million, dwarfing even the largest bounty payouts
β’Protocols with active bug bounty programs experienced 65% fewer critical exploits than those without
β’White-hat submissions increased 340% between 2023 and 2025 as the security researcher community matured
Bug bounties work because they align incentives. A researcher who discovers a critical vulnerability in your protocol has two choices: exploit it for uncertain gains with legal risk, or report it for a guaranteed, often life-changing payout. Your bounty program makes the ethical choice the rational one.
Platform Comparison: Choosing the Right Fit
Immunefi β The Web3 Standard
Immunefi dominates Web3 bug bounties with over 300 active programs and $180 million in total payouts. The platform is purpose-built for DeFi and smart contract security.
Strengths: Largest Web3 researcher community (45,000+), crypto-native payment rails, DeFi-specific severity classification, proof-of-concept requirements that filter noise, and dedicated triage support for high-severity reports.
Pricing: 10% fee on payouts. No setup fees for standard programs. Enterprise triage services available at additional cost.
Best for: DeFi protocols, L1/L2 chains, bridges, and any project with significant on-chain TVL.
HackerOne β Enterprise-Grade Infrastructure
HackerOne brings traditional cybersecurity rigor to Web3. With over 1 million registered hackers, the platform offers unmatched scale for projects that span both Web2 and Web3 infrastructure.
Pricing: Annual subscription model starting at $20,000/year for managed programs. Higher cost but includes triage staff.
Best for: Projects with significant Web2 attack surface (frontends, APIs, cloud infrastructure) alongside smart contracts. Ideal for enterprise-focused Web3 companies.
Code4rena β Competitive Audit Contests
Code4rena pioneered the competitive audit model, blending traditional audits with bounty mechanics. Auditors compete during time-boxed contests, with rewards distributed based on finding severity and uniqueness.
Strengths: Time-bound engagements produce concentrated review effort, competitive dynamics encourage thoroughness, public reports build transparency, and the warden community includes many top-tier auditors.
Pricing: Contest pools typically range from $50,000 to $500,000. Platform takes a percentage for coordination and judging.
Best for: Pre-launch audit supplementation, new protocol versions, and teams that want intensive review of specific codebases within a defined timeframe.
Sherlock β Audit + Coverage Hybrid
Sherlock combines auditing with smart contract coverage (insurance), creating a unique model where auditors have skin in the game.
Strengths: Auditors back their work with staked capital, coverage payouts for missed vulnerabilities up to the coverage amount, strong auditor vetting process, and aligned incentives between auditors and protocols.
Pricing: Audit fees plus ongoing coverage premiums. Coverage typically costs 2-5% of the covered amount annually.
Best for: Protocols seeking both audit services and financial backstop against missed vulnerabilities.
Platform Decision Matrix
Factor
Immunefi
HackerOne
Code4rena
Sherlock
Web3 Focus
Native
Adapted
Native
Native
Researcher Pool
45K+
1M+
2K+ wardens
500+ vetted
Setup Time
1-2 weeks
2-4 weeks
Contest schedule
2-3 weeks
Ongoing Cost
% of payouts
Subscription
Per contest
Audit + premium
Triage Support
Optional
Included
Judges
Protocol team
Best TVL Range
$1M+
$10M+
Any
$5M+
Reward Tiers: Getting the Numbers Right
Underpaying bounties is worse than having no program. If your maximum payout is $10,000 but your protocol holds $100 million in TVL, rational researchers will sell the exploit on the black market or simply ignore your program.
Recommended Reward Structure
Critical (Direct fund loss, unlimited drainage): 5-10% of funds at risk, minimum $50,000, up to $10 million+. These vulnerabilities allow attackers to drain user funds or mint unbounded tokens.
High (Conditional fund loss, governance manipulation): $25,000 - $200,000. Vulnerabilities requiring specific conditions but still resulting in material loss. Includes oracle manipulation, governance attacks, and privilege escalation.
Medium (Limited fund loss, service disruption): $5,000 - $50,000. Temporary freezing of funds, griefing attacks, or denial-of-service conditions that affect protocol operation without permanent loss.
Low (Informational, best practices): $500 - $5,000. Gas optimization issues, minor UI/UX vulnerabilities, informational disclosures that do not directly threaten funds.
The 10% Rule
Industry best practice has converged on a simple heuristic: your maximum bounty should equal roughly 10% of the maximum extractable value. Wormhole set the standard with its $10 million maximum bounty β proportional to the billions in cross-chain value it secures. This ratio makes responsible disclosure the dominant economic strategy for researchers.
Program Structure and Scope Definition
A well-scoped program prevents wasted time on both sides. Your scope document should be precise enough to eliminate ambiguity but broad enough to catch unexpected attack vectors.
What to Include in Scope
Smart contracts: All deployed and audited contracts, specifying chain and addresses. Include proxy implementations and any upgradeable components.
Backend infrastructure: API endpoints, RPC nodes, indexers, and oracle infrastructure. Specify which environments are in scope (production, staging).
Frontend applications: Web interfaces, mobile apps, browser extensions. Define whether XSS, CSRF, and other web vulnerabilities qualify.
Out of scope: Third-party dependencies you do not control, known issues documented in previous audits, theoretical attacks without proof of concept, social engineering, and denial-of-service attacks against public infrastructure.
Writing Effective Rules of Engagement
β’Require proof of concept for all submissions above Low severity. This single rule eliminates 80% of low-quality submissions.
β’Define the testing environment. Provide testnet deployments or forked mainnet environments. Explicitly prohibit testing against production with real user funds.
β’Set response SLAs. Commit to acknowledging reports within 24 hours and providing a severity assessment within 72 hours.
β’Specify payment terms. State the currency (USDC, native token, or fiat), payment timeline (typically within 30 days of fix verification), and any vesting conditions for exceptionally large payouts.
Triage Process: From Report to Resolution
Efficient triage is what separates functional programs from abandoned ones. Here is a battle-tested workflow:
Step 1 β Intake (0-24 hours): Acknowledge receipt, assign an internal tracking ID, and route to the appropriate security team member. Auto-responders are acceptable for acknowledgment but human review must follow.
Step 2 β Validation (24-72 hours): Reproduce the vulnerability in a controlled environment. Verify the proof of concept. Assess actual severity against your classification framework.
Step 3 β Severity Negotiation (72 hours - 1 week): Communicate your severity assessment to the researcher. Be transparent about your reasoning. Many disputes arise from misaligned severity definitions β resolve these early.
Step 4 β Fix Development (1-2 weeks): Develop and internally test the patch. For smart contract fixes, this may require a full audit cycle. Keep the researcher informed of progress.
Step 5 β Fix Verification (1-3 days): Allow the original researcher to verify the fix resolves the vulnerability. This builds trust and catches incomplete patches.
Step 6 β Payout and Disclosure (Within 30 days of fix deployment): Process the bounty payment. Coordinate public disclosure timeline with the researcher. Most programs allow 90-day disclosure windows.
Legal Considerations
Safe Harbor Provisions
Your program must include a clear safe harbor clause protecting researchers from legal action when they follow your rules of engagement. Without this, top researchers will skip your program entirely.
Essential safe harbor elements:
β’Explicit authorization to test within the defined scope
β’Commitment not to pursue legal action for good-faith research
β’Protection from CFAA (Computer Fraud and Abuse Act) claims
β’Clear distinction between authorized testing and malicious exploitation
Tax and Compliance
Bounty payments above $600 to US persons require 1099 reporting. International payments may trigger additional compliance requirements. Work with legal counsel to establish KYC/AML procedures for large payouts β particularly important when paying in cryptocurrency.
ROI Calculation: Making the Business Case
Bug bounties are among the highest-ROI security investments available. Here is how to frame the numbers:
Cost of a critical exploit: Average $12.3 million in direct losses, plus reputational damage, legal exposure, and potential regulatory consequences. Total impact frequently exceeds $50 million.
Annual bug bounty program cost: For a mid-size DeFi protocol ($50M TVL), expect $100,000-$500,000 annually in payouts, plus $50,000-$100,000 in platform and operational costs.
Break-even analysis: A single prevented critical exploit pays for 20-50 years of bounty program operation. The expected value calculation is overwhelmingly positive.
Insurance benefits: Many DeFi insurance providers (Nexus Mutual, InsurAce) offer reduced premiums for protocols with active, well-funded bug bounty programs.
Case Studies
Wormhole: The $10 Million Save
In February 2022, a white-hat researcher discovered a critical vulnerability in Wormhole's Solana bridge contracts that could have allowed an attacker to mint unlimited wrapped ETH. The potential loss exceeded $300 million. Wormhole's $10 million maximum bounty β the largest ever paid at the time β ensured the researcher chose disclosure over exploitation. The vulnerability was patched within 24 hours of the report. This single bounty payout prevented losses 30x its size.
Polygon: $2 Million Critical Vulnerability
In late 2021, a researcher reported a critical vulnerability in Polygon's PoS bridge that put approximately $850 million worth of MATIC at risk. Polygon's bug bounty program, hosted on Immunefi, paid $2 million β the maximum at the time. The fix was deployed via emergency upgrade within 48 hours. Had this vulnerability been exploited, it could have fundamentally undermined confidence in the entire Polygon ecosystem.
What These Cases Teach Us
Both cases share common elements: the bounty was proportional to the risk, the triage was rapid, the fix was deployed quickly, and the researcher was paid promptly. Speed and fairness are the two non-negotiable factors.
Getting Started: Your 30-Day Launch Plan
Week 1: Define scope, severity classifications, and reward tiers. Draft rules of engagement and safe harbor provisions. Review with legal counsel.
Week 2: Select your platform (Immunefi for most Web3 projects). Configure your program, set up payment infrastructure, and establish internal triage workflows.
Week 3: Soft launch to a private group of vetted researchers. Process initial submissions to stress-test your triage workflow. Iterate on scope and rules based on early feedback.
Week 4: Public launch. Announce via your security channels, Twitter/X, Discord, and relevant security researcher communities. Monitor submission volume and triage quality closely for the first 30 days.
A well-structured bug bounty program is one of the most effective security investments any Web3 project can make. The cost is predictable, the ROI is extraordinary, and the alternative β hoping attackers do not find what auditors missed β is not a strategy. Launch your program today.
Frequently Asked Questions
How much should a Web3 bug bounty program budget annually?
For protocols with $10-100M TVL, budget $100,000-$500,000 annually for payouts plus $50,000-$100,000 for platform and operational costs. Scale your maximum critical bounty to approximately 10% of funds at risk. Programs protecting over $1B in TVL should budget $1M+ annually.
Can a bug bounty program replace a smart contract audit?
No. Bug bounties and audits serve complementary purposes. Audits provide systematic, time-bound review before deployment. Bug bounties provide continuous, ongoing security coverage post-deployment. Best practice is to audit first, then launch a bounty program to catch what auditors missed.
How do you handle duplicate vulnerability reports?
The first valid report receives the full bounty. Duplicate reports submitted after the first are typically rewarded with a smaller consolation payout ($500-$2,000) to maintain researcher goodwill. Clearly state your duplication policy in your program rules.
What is the average response time for bug bounty triage?
Industry best practice is 24-hour acknowledgment and 72-hour severity assessment. Top programs like Immunefi's managed service achieve median first response times under 12 hours. Slow triage drives top researchers away from your program.
Should bounty rewards be paid in crypto or fiat?
Offer both options when possible. Most Web3 researchers prefer stablecoin payments (USDC/USDT) for tax simplicity and immediate liquidity. Some programs offer bonus multipliers for accepting payment in the protocol's native token with a vesting schedule, aligning long-term incentives.
β’Immunefi alone facilitated over $100 million in bounty payouts through 2025, preventing an estimated $25 billion in potential losses
β’The average cost of a DeFi exploit in 2025 was $12.3 million, dwarfing even the largest bounty payouts
β’Protocols with active bug bounty programs experienced 65% fewer critical exploits than those without
β’White-hat submissions increased 340% between 2023 and 2025 as the security researcher community matured
Bug bounties work because they align incentives. A researcher who discovers a critical vulnerability in your protocol has two choices: exploit it for uncertain gains with legal risk, or report it for a guaranteed, often life-changing payout. Your bounty program makes the ethical choice the rational one.
Platform Comparison: Choosing the Right Fit
Immunefi β The Web3 Standard
Immunefi dominates Web3 bug bounties with over 300 active programs and $180 million in total payouts. The platform is purpose-built for DeFi and smart contract security.
Strengths: Largest Web3 researcher community (45,000+), crypto-native payment rails, DeFi-specific severity classification, proof-of-concept requirements that filter noise, and dedicated triage support for high-severity reports.
Pricing: 10% fee on payouts. No setup fees for standard programs. Enterprise triage services available at additional cost.
Best for: DeFi protocols, L1/L2 chains, bridges, and any project with significant on-chain TVL.
HackerOne β Enterprise-Grade Infrastructure
HackerOne brings traditional cybersecurity rigor to Web3. With over 1 million registered hackers, the platform offers unmatched scale for projects that span both Web2 and Web3 infrastructure.
Pricing: Annual subscription model starting at $20,000/year for managed programs. Higher cost but includes triage staff.
Best for: Projects with significant Web2 attack surface (frontends, APIs, cloud infrastructure) alongside smart contracts. Ideal for enterprise-focused Web3 companies.
Code4rena β Competitive Audit Contests
Code4rena pioneered the competitive audit model, blending traditional audits with bounty mechanics. Auditors compete during time-boxed contests, with rewards distributed based on finding severity and uniqueness.
Strengths: Time-bound engagements produce concentrated review effort, competitive dynamics encourage thoroughness, public reports build transparency, and the warden community includes many top-tier auditors.
Pricing: Contest pools typically range from $50,000 to $500,000. Platform takes a percentage for coordination and judging.
Best for: Pre-launch audit supplementation, new protocol versions, and teams that want intensive review of specific codebases within a defined timeframe.
Sherlock β Audit + Coverage Hybrid
Sherlock combines auditing with smart contract coverage (insurance), creating a unique model where auditors have skin in the game.
Strengths: Auditors back their work with staked capital, coverage payouts for missed vulnerabilities up to the coverage amount, strong auditor vetting process, and aligned incentives between auditors and protocols.
Pricing: Audit fees plus ongoing coverage premiums. Coverage typically costs 2-5% of the covered amount annually.
Best for: Protocols seeking both audit services and financial backstop against missed vulnerabilities.
Platform Decision Matrix
Factor
Immunefi
HackerOne
Code4rena
Sherlock
Web3 Focus
Native
Adapted
Native
Native
Researcher Pool
45K+
1M+
2K+ wardens
500+ vetted
Setup Time
1-2 weeks
2-4 weeks
Contest schedule
2-3 weeks
Ongoing Cost
% of payouts
Subscription
Per contest
Audit + premium
Triage Support
Optional
Included
Judges
Protocol team
Best TVL Range
$1M+
$10M+
Any
$5M+
Reward Tiers: Getting the Numbers Right
Underpaying bounties is worse than having no program. If your maximum payout is $10,000 but your protocol holds $100 million in TVL, rational researchers will sell the exploit on the black market or simply ignore your program.
Recommended Reward Structure
Critical (Direct fund loss, unlimited drainage): 5-10% of funds at risk, minimum $50,000, up to $10 million+. These vulnerabilities allow attackers to drain user funds or mint unbounded tokens.
High (Conditional fund loss, governance manipulation): $25,000 - $200,000. Vulnerabilities requiring specific conditions but still resulting in material loss. Includes oracle manipulation, governance attacks, and privilege escalation.
Medium (Limited fund loss, service disruption): $5,000 - $50,000. Temporary freezing of funds, griefing attacks, or denial-of-service conditions that affect protocol operation without permanent loss.
Low (Informational, best practices): $500 - $5,000. Gas optimization issues, minor UI/UX vulnerabilities, informational disclosures that do not directly threaten funds.
The 10% Rule
Industry best practice has converged on a simple heuristic: your maximum bounty should equal roughly 10% of the maximum extractable value. Wormhole set the standard with its $10 million maximum bounty β proportional to the billions in cross-chain value it secures. This ratio makes responsible disclosure the dominant economic strategy for researchers.
Program Structure and Scope Definition
A well-scoped program prevents wasted time on both sides. Your scope document should be precise enough to eliminate ambiguity but broad enough to catch unexpected attack vectors.
What to Include in Scope
Smart contracts: All deployed and audited contracts, specifying chain and addresses. Include proxy implementations and any upgradeable components.
Backend infrastructure: API endpoints, RPC nodes, indexers, and oracle infrastructure. Specify which environments are in scope (production, staging).
Frontend applications: Web interfaces, mobile apps, browser extensions. Define whether XSS, CSRF, and other web vulnerabilities qualify.
Out of scope: Third-party dependencies you do not control, known issues documented in previous audits, theoretical attacks without proof of concept, social engineering, and denial-of-service attacks against public infrastructure.
Writing Effective Rules of Engagement
β’Require proof of concept for all submissions above Low severity. This single rule eliminates 80% of low-quality submissions.
β’Define the testing environment. Provide testnet deployments or forked mainnet environments. Explicitly prohibit testing against production with real user funds.
β’Set response SLAs. Commit to acknowledging reports within 24 hours and providing a severity assessment within 72 hours.
β’Specify payment terms. State the currency (USDC, native token, or fiat), payment timeline (typically within 30 days of fix verification), and any vesting conditions for exceptionally large payouts.
Triage Process: From Report to Resolution
Efficient triage is what separates functional programs from abandoned ones. Here is a battle-tested workflow:
Step 1 β Intake (0-24 hours): Acknowledge receipt, assign an internal tracking ID, and route to the appropriate security team member. Auto-responders are acceptable for acknowledgment but human review must follow.
Step 2 β Validation (24-72 hours): Reproduce the vulnerability in a controlled environment. Verify the proof of concept. Assess actual severity against your classification framework.
Step 3 β Severity Negotiation (72 hours - 1 week): Communicate your severity assessment to the researcher. Be transparent about your reasoning. Many disputes arise from misaligned severity definitions β resolve these early.
Step 4 β Fix Development (1-2 weeks): Develop and internally test the patch. For smart contract fixes, this may require a full audit cycle. Keep the researcher informed of progress.
Step 5 β Fix Verification (1-3 days): Allow the original researcher to verify the fix resolves the vulnerability. This builds trust and catches incomplete patches.
Step 6 β Payout and Disclosure (Within 30 days of fix deployment): Process the bounty payment. Coordinate public disclosure timeline with the researcher. Most programs allow 90-day disclosure windows.
Legal Considerations
Safe Harbor Provisions
Your program must include a clear safe harbor clause protecting researchers from legal action when they follow your rules of engagement. Without this, top researchers will skip your program entirely.
Essential safe harbor elements:
β’Explicit authorization to test within the defined scope
β’Commitment not to pursue legal action for good-faith research
β’Protection from CFAA (Computer Fraud and Abuse Act) claims
β’Clear distinction between authorized testing and malicious exploitation
Tax and Compliance
Bounty payments above $600 to US persons require 1099 reporting. International payments may trigger additional compliance requirements. Work with legal counsel to establish KYC/AML procedures for large payouts β particularly important when paying in cryptocurrency.
ROI Calculation: Making the Business Case
Bug bounties are among the highest-ROI security investments available. Here is how to frame the numbers:
Cost of a critical exploit: Average $12.3 million in direct losses, plus reputational damage, legal exposure, and potential regulatory consequences. Total impact frequently exceeds $50 million.
Annual bug bounty program cost: For a mid-size DeFi protocol ($50M TVL), expect $100,000-$500,000 annually in payouts, plus $50,000-$100,000 in platform and operational costs.
Break-even analysis: A single prevented critical exploit pays for 20-50 years of bounty program operation. The expected value calculation is overwhelmingly positive.
Insurance benefits: Many DeFi insurance providers (Nexus Mutual, InsurAce) offer reduced premiums for protocols with active, well-funded bug bounty programs.
Case Studies
Wormhole: The $10 Million Save
In February 2022, a white-hat researcher discovered a critical vulnerability in Wormhole's Solana bridge contracts that could have allowed an attacker to mint unlimited wrapped ETH. The potential loss exceeded $300 million. Wormhole's $10 million maximum bounty β the largest ever paid at the time β ensured the researcher chose disclosure over exploitation. The vulnerability was patched within 24 hours of the report. This single bounty payout prevented losses 30x its size.
Polygon: $2 Million Critical Vulnerability
In late 2021, a researcher reported a critical vulnerability in Polygon's PoS bridge that put approximately $850 million worth of MATIC at risk. Polygon's bug bounty program, hosted on Immunefi, paid $2 million β the maximum at the time. The fix was deployed via emergency upgrade within 48 hours. Had this vulnerability been exploited, it could have fundamentally undermined confidence in the entire Polygon ecosystem.
What These Cases Teach Us
Both cases share common elements: the bounty was proportional to the risk, the triage was rapid, the fix was deployed quickly, and the researcher was paid promptly. Speed and fairness are the two non-negotiable factors.
Getting Started: Your 30-Day Launch Plan
Week 1: Define scope, severity classifications, and reward tiers. Draft rules of engagement and safe harbor provisions. Review with legal counsel.
Week 2: Select your platform (Immunefi for most Web3 projects). Configure your program, set up payment infrastructure, and establish internal triage workflows.
Week 3: Soft launch to a private group of vetted researchers. Process initial submissions to stress-test your triage workflow. Iterate on scope and rules based on early feedback.
Week 4: Public launch. Announce via your security channels, Twitter/X, Discord, and relevant security researcher communities. Monitor submission volume and triage quality closely for the first 30 days.
A well-structured bug bounty program is one of the most effective security investments any Web3 project can make. The cost is predictable, the ROI is extraordinary, and the alternative β hoping attackers do not find what auditors missed β is not a strategy. Launch your program today.
Frequently Asked Questions
How much should a Web3 bug bounty program budget annually?
For protocols with $10-100M TVL, budget $100,000-$500,000 annually for payouts plus $50,000-$100,000 for platform and operational costs. Scale your maximum critical bounty to approximately 10% of funds at risk. Programs protecting over $1B in TVL should budget $1M+ annually.
Can a bug bounty program replace a smart contract audit?
No. Bug bounties and audits serve complementary purposes. Audits provide systematic, time-bound review before deployment. Bug bounties provide continuous, ongoing security coverage post-deployment. Best practice is to audit first, then launch a bounty program to catch what auditors missed.
How do you handle duplicate vulnerability reports?
The first valid report receives the full bounty. Duplicate reports submitted after the first are typically rewarded with a smaller consolation payout ($500-$2,000) to maintain researcher goodwill. Clearly state your duplication policy in your program rules.
What is the average response time for bug bounty triage?
Industry best practice is 24-hour acknowledgment and 72-hour severity assessment. Top programs like Immunefi's managed service achieve median first response times under 12 hours. Slow triage drives top researchers away from your program.
Should bounty rewards be paid in crypto or fiat?
Offer both options when possible. Most Web3 researchers prefer stablecoin payments (USDC/USDT) for tax simplicity and immediate liquidity. Some programs offer bonus multipliers for accepting payment in the protocol's native token with a vesting schedule, aligning long-term incentives.