Aave V3 on Aptos
Bounty Range
$500,000 - $500,000
external program
Bounty Range
$500,000 - $500,000
external program
/opportunities/leaderboard[/welcome](Discover Cantina)
[/login](Log in)[/signup](Sign up)
@avara Live
https://x.com/avarahttps://github.com/aavehttps://avara.xyz/
Total reward
500,000 GHO
Deposit required
$50
Findings submitted
82
Start date
8 Aug 2025
Please sign in as a researcher to join the bounty.
[/login](Log in)
Aave is launching its first non-EVM implementation of the Aave V3 protocol on the Aptos blockchain. This deployment represents a significant milestone as it marks Aave's expansion beyond EVM-compatible chains into the Move language ecosystem. The Aave V3 on Aptos implementation has been developed in the Move programming language, closely following the Aave V3.3 implementation but without the umbrella and liquid e-modes components.
To ensure the security and integrity of this groundbreaking implementation, Aave is partnering with Cantina to run a comprehensive bug bounty program. This program aims to identify and address potential vulnerabilities before they can be exploited, protecting user funds and maintaining the high security standards that the Aave community expects.
We invite security researchers, Move language experts, and blockchain security professionals to participate in this bug bounty program and help secure this innovative implementation of the Aave protocol.
Aave is a decentralized non-custodial liquidity protocol where users can participate as suppliers or borrowers in a common pool. Suppliers provide liquidity to earn a passive income, while borrowers are able to borrow in an overcollateralized (perpetually) or undercollateralized (one-block liquidity) fashion.
Aptos is a blockchain designed for building scalable and secure dApps. Developed by former leaders of Meta's Diem blockchain project, it aims to address some of the limitations in existing blockchain systems such as throughput, scalability, and security. With its robust infrastructure, Aptos offers high transaction throughput, low and predictable fees, and advanced security through the Move programming language.
The Move programming language is specifically designed for secure asset management on blockchain platforms. It features a strong type system and linear logic that enhances security by ensuring resources can only be moved, not copied or implicitly discarded. This prevents common vulnerabilities like double-spending and provides inherent protection against reentrancy attacks, making it an ideal language for financial applications like Aave.
The Aave V3 on Aptos implementation is a complete rewrite of the Aave protocol in the Move language. It follows the architecture of AaveV3.3 but excludes the umbrella and liquid e-modes components. The implementation consists of several key packages:
The following assets are considered in-scope for this bug bounty program: https://github.com/aave/aptos-aave-v3
The latest commit on the main branch is considered in scope
Smart Contracts (Move Modules)
All Move modules in the official Aave V3 on Aptos repository :
Specifically, all modules within the following packages:
aave-acl
aave-config
aave-logic
aave-math
aave-oracle
aave-periphery
aave-pool
aave-rate
aave-tokens
Frontend and Interfaces
The official [https://aptos.aave.com/](Aave V3 on Aptos web interface)
API endpoints related to the Aave V3 on Aptos implementation
Deployment and Configuration
The following are explicitly excluded from the scope of this bug bounty program:
Known Issues
Vulnerabilities that have already been reported or are known to the Aave team
Issues that have been identified in previous audits and are pending fixes
Third-Party Dependencies
Vulnerabilities in the Aptos blockchain itself
Issues in third-party libraries or dependencies not developed by Aave
Chainlink oracle implementation (only the integration is in scope)
Specific Exclusions
Theoretical vulnerabilities without a working proof of concept
Issues requiring privileged access (e.g., governance or admin keys)
Economic or tokenomic vulnerabilities that do not result in direct loss of funds
Gas optimization issues without security implications
Centralization risks inherent to the protocol design
Non-Technical Issues
The reports for Aave V3 on Aptos implementation security reviews:
All submissions must include:
For all severity levels except Low/Informational, a working proof of concept is required. This can be in the form of:
The PoC should be self-contained and executable in a local test environment to facilitate verification.
All vulnerabilities must be reported exclusively through the Cantina platform and must not be disclosed publicly until:
When testing for vulnerabilities:
The following actions are strictly prohibited:
In the case of duplicate submissions:
This bug bounty program is open to all security researchers who:
The following individuals are ineligible to participate:
Payment of rewards may be subject to Know Your Customer (KYC) verification. Participants should be prepared to provide identification documents if requested, especially for high-value rewards.
Vulnerabilities are classified using two factors: Impact and Likelihood. The combination of these factors determines the severity and guides the reward amount.
Vulnerabilities will be classified according to the following severity levels:
Critical
Direct theft of user funds (at least $100,000 at risk)
Permanent freezing of user funds (>$100,000)
Protocol insolvency due to accounting errors
Unauthorized minting of tokens
Permanent modification of protocol parameters leading to significant loss
High
Direct theft of user funds (<$100,000 at risk)
Temporary freezing of user funds (>2 days)
Theft of unclaimed yield
Permanent freezing of unclaimed yield
Significant manipulation of oracle prices affecting protocol operations
Medium
Smart contracts inoperable due to lack of funds
Griefing attacks causing temporary service disruption Unbounded gas consumption
Temporary freezing of funds (<2 days)
Incorrect interest rate calculations affecting protocol economics
Low/Informational
The severity level of a vulnerability will be determined based on both its impact and likelihood:
Impact Factors
Amount of funds at risk
Number of users affected
Duration of the vulnerability's effect
Complexity of exploitation
Requirement for privileged access
Likelihood Factors
Rewards will be paid in GHO according to the following structure:
Severity Level | Reward Range | Critical | $25,000 - $500,000 | High | $5,000 - $25,000 | Medium | Flat $5,000 | Low | Flat $1,000 |
Reward Calculation for Critical Vulnerabilities
For critical vulnerabilities, the reward amount will be calculated as 10% of the funds directly affected, up to a maximum of $500,000. The calculation of the amount of funds at risk will be based on the time and date the bug report is submitted.
A minimum reward of $25,000 will be awarded for critical vulnerabilities to incentivize security researchers against withholding bug reports. There needs to be an absolute minimum of $10,000 at risk for a vulnerability to be considered Critical.
Reward Calculation for High Severity Vulnerabilities
For high severity vulnerabilities, rewards will be capped at up to 100% of the funds affected, with a maximum of $25,000. In the case of temporary locking of funds, the reward will increase based on the duration of the lock, up to the maximum amount.
Bonus Considerations
Additional bonuses may be awarded for:
Exceptional quality of the vulnerability report
Provided fix or mitigation strategy
Novel attack vectors or vulnerability types
Vulnerabilities affecting multiple components
All information provided by Aave during the bug bounty program must be treated as confidential. Participants agree not to disclose any non-public information about the Aave V3 on Aptos implementation without explicit permission.
Participation in this bug bounty program constitutes acceptance of these terms and conditions. Aave reserves the right to modify these terms at any time, with changes being effective upon posting to the bug bounty page.
Aave and Cantina are not liable for any damages resulting from:
This bug bounty program and all related activities are governed by the laws of the jurisdiction in which Aave operates. Any disputes arising from this program will be resolved according to these laws.
The Aave V3 on Aptos implementation leverages several key features of the Move language to enhance security:
When reviewing the Aave V3 on Aptos implementation, consider the following Move-specific security considerations:
By submitting a report, you grant Aave the rights necessary to investigate, mitigate, and disclose the vulnerability. Reward decisions and eligibility are at the sole discretion of Aave. The terms, conditions, and scope of this Program may be revised at any time. All participants are responsible for reviewing the latest version before submitting a report.