
Enzyme Onyx
Bounty Range
$1,000 - $200,000
external program
Onyx by Enzyme Finance is a tokenization protocol for asset management vehicles. It facilitates bespoke ERC20 shares issuance, including fees and tools for valuation accounting.
Before submitting a report, please review our Bug Bounty program guidelines carefully. Reports that only cover issues already listed in the program scope will be closed and marked as spam.
Smart contracts may have both a currently deployed version and the latest audited version that is scheduled for deployment. These are labeled as follows:
If no labels are present, it means the deployed (live) smart contract is already up to date with the latest audited version.
Maximum Bounty: $200,000 Live Since: 04 September 2025 Last Updated: 24 March 2026
Enzyme Onyx provides rewards in USDC on Ethereum, denominated in USD.
Smart Contract
Mainnet assets: Reward amount is 10% of the funds directly affected up to a maximum of $200,000.
Minimum reward to discourage security researchers from withholding a bug report: $20,000
Rewards are distributed according to the impact of the vulnerability based on the Immunefi Vulnerability Severity Classification System v2.3.
| Auditor | Link | Completed at |
|---|---|---|
| ChainSecurity | https://github.com/enzymefinance/protocol-onyx/tree/main/audits | 1 September 2025 |
KYC: Not required for payout processing.
Proof of Concept: Proof of concept is always required for all severities.
The project may be receiving reports that are valid (the bug and attack vector are real) and cite assets and impacts that are in scope, but there may be obstacles or barriers to executing the attack in the real world. In other words, there is a question about how feasible the attack really is. Conversely, there may also be mitigation measures that projects can take to prevent the impact of the bug, which are not feasible or would require unconventional action and hence, should not be used as reasons for downgrading a bug's severity.
Therefore, Immunefi has developed a set of feasibility limitation standards which by default states what security researchers, as well as projects, can or cannot cite when reviewing a bug report: