Shield is a security tool. A silent bypass is worse than the drain it was built to stop. We publish the full scope, severity tiers, SLA, and safe-harbour today — and we'll activate dollar payouts the day our first paying pilot signs. Researchers who file before that are paid retroactively at the tier we confirmed them into.
⚠ Honest status: Shield is pre-revenue. Advertising a dollar bounty we cannot cut a cheque for would be dishonest. Scope and tiers are binding now; dollar ranges publish on the same commit that flips the program from pre-revenue to first-paying-customer.
Tier classification is binding today — confirmed reports enter the hall of fame at the confirmed tier. Dollar ranges per tier publish and backfill retroactively once the program is funded by a paying pilot. Payouts, on activation, in USDC on Ethereum mainnet or a mutually-agreed L2 stablecoin.
| Asset | Status | Notes |
|---|---|---|
products/zoza-shield/extension/** |
In | Highest priority. inpage.js provider hook is the bigger target. |
products/zoza-shield-sdk/** |
In | Published as @zoza/shield. Decoder parity issues between SDK and extension count as High severity. |
products/zoza-shield/*.go (backend) |
In | Registry API, audit log, multisig verifier, B2B decoder, API-key store, Shield URL check. |
products/zoza-shield/cmd/shield-sign-hsm/** |
In | PKCS#11 HSM signer. Leaks of key material from process memory are Critical. |
products/zoza-safe-guard/** (Solidity) |
Post-audit | In scope after external audit completes. Pre-audit issues are welcome but not paid until fix lands and audit re-confirms. |
shield-api.zoza.world |
In | Production HTTP API. |
Shield transparency pages (/about/shield-audit.html, /about/shield-canary.html) |
In | Client-side verification bugs that cause a false "valid" are Critical. |
zoza-backend.fly.dev — separate bounty scope coming.zoza-auth, zoza-verify, zoza-vault, zoza-ai, zoza-sign) — each gets its own program on launch.Researchers acting in good faith and within this scope are authorized to reverse-engineer, decompile, and test against their own wallets. Zoza will not pursue action under the CFAA, India's IT Act § 43/66, the DMCA, or equivalents.
Safe harbor does NOT cover: attacks against real user wallets/balances (test with your own funds); exfiltrating other users' data (stop and report if accidental); destructive testing against production; physical attacks.
Preferred: the Immunefi reporting form (link appears here once Zoza is listed).
Otherwise: PGP-encrypted email to security@zoza.world with
[SHIELD-BOUNTY] in the subject. PGP key at
/.well-known/security.txt.
As valid submissions land, acknowledged researchers (with permission) will be listed here by handle and submission date. No entries yet — be the first.