
Parallel
Bounty Range
$1,000 - $250,000
external program
[/bug-bounty/](Back to Explore)
https://github.com/parallel-protocol?utm_source=immunefihttps://parallel.best/?utm_source=immunefi|
Parallel is a capital-efficient, modular stablecoins protocol that allows the creation of over-collateralized, decentralized stablecoins. The protocol consists of several different modules, which can be added or removed over time by the DAO, from which stablecoins can be issued or minted.
ETH Polygon Arbitrum Avalanche Base Gnosis LayerZero Optimism Scroll Sei BSC xDAI / Gnosis Chain Defi Stablecoin CDP DAO JavaScript NextJS ReactJS Solidity
Maximum Bounty $250,000 Live Since 02 October 2025 Last Updated 04 March 2026
Triaged by Immunefi
PoC Required
KYC required
[https://bugs.immunefi.com/dashboard/new-submission?utm_source=immunefi](Submit a Bug)
/bug-bounty/ /bug-bounty/parallel/information/#top/bug-bounty/parallel/scope/#top/bug-bounty/parallel/resources/#top
Parallel provides rewards in USDp on Ethereum, denominated in USD.
Smart Contract Critical Max: $250,000Min: $50,000
Primacy of Rules
High Max: $50,000Min: $10,000
Primacy of Rules
Medium Up to: $5,000 Primacy of Rules
Low Flat: $1,000 Primacy of Rules
Critical Reward Calculation
Reward amount is 10% of the funds directly affected up to a maximum of:
$250,000 Minimum reward to discourage security researchers from withholding a bug report:
$50,000
Websites and Applications Critical Max: $50,000Min: $10,000
Primacy of Rules
High Up to: $2,500 Primacy of Rules
Medium Up to: $1,500 Primacy of Rules
Low Flat: $1,000 Primacy of Rules
Rewards Body
Rewards are distributed according to the impact of the vulnerability based on the [https://immunefi.com/immunefi-vulnerability-severity-classification-system-v2-3/](Immunefi Vulnerability Severity Classification System V2.3).
Reward Calculation for Critical Level Reports
For critical smart contract bugs, the reward amount is 10% of the funds directly affected up to a maximum of USD 250,000. The calculation of the amount of funds at risk is based on the time and date the bug report is submitted. However, a minimum reward of USD 50,000 is to be rewarded in order to incentivize security researchers against withholding a critical bug report.
For critical web/apps bugs, reports will be rewarded with USD $50,000, only if the impact leads to:
A loss of funds involving an attack that does not require any user action
Private key or private key generation leakage leading to unauthorized access to user funds
All other impacts that would be classified as Critical would be rewarded a flat amount of $10,000. The rest of the severity levels are paid out according to the Impact in Scope table.
Repeatable Attack Limitations
If the smart contract where the vulnerability exists can be upgraded or paused, only the initial attack will be considered for a reward. This is because the project can mitigate the risk of further exploitation by upgrading or pausing the component where the vulnerability exists. The reward amount will depend on the severity of the impact and the funds at risk.
For critical repeatable attacks on smart contracts that cannot be upgraded or paused, the project will consider the cumulative impact of the repeatable attacks for a reward. This is because the project cannot prevent the attacker from repeatedly exploiting the vulnerability until all funds are drained and/or other irreversible damage is done. Therefore, this warrants a reward equivalent to 10% of funds at risk, capped at the maximum critical reward.
Reward Calculation for High Level Reports
High vulnerabilities concerning theft/permanent freezing of unclaimed yield/royalties are rewarded within a range of $10,000 to $50,000 depending on the funds at risk, capped at the maximum high reward.
In the event of temporary freezing, the reward doubles from the full frozen value for every additional 24h that the funds are temporarily frozen, up until a max cap of the high reward. This is because as the duration of the freezing lengthens, the potential for greater damage and subsequent reputational harm intensifies. Thus, by increasing the reward proportionally with the frozen duration, the project ensures stronger incentives for bug disclosure of this nature.
Reward Payment Terms
Payouts are handled by the Parallel team directly and are denominated in USD. However, payments are done in USDp on Ethereum.
The calculation of the net amount rewarded is based on the average price between CoinMarketCap.com and CoinGecko.com at the time the bug report was submitted. No adjustments are made based on liquidity availability.
[/bug-bounty/parallel/scope/#impacts]( View impacts in scope)
Parallel is a decentralized protocol that issues stablecoins, the EUR stablecoin (PAR) and the USD stablecoin (paUSD), on the Ethereum and Polygon PoS blockchains. The PAR & paUSD stablecoin are decentralized, non-custodials, and collateral-backed FIAT stablecoins.
For more information about Parallel, please visit https://parallel.best/?utm_source=immunefi.
Parallel provides rewards in paUSD on Ethereum, denominated in USD. For more details about the payment process, please view the Rewards by Threat Level section.
Eligibility Criteria
Security researchers who wish to participate must adhere to the rules of engagement set forth in this program and cannot be:
On OFACs SDN list
Official contributor, both past or present
Employees and/or individuals closely associated with the project
Security auditors that directly or indirectly participated in the audit review
Primacy of Impact vs Primacy of Rules
Parallel adheres to the Primacy of Rules, which means that the whole bug bounty program is run strictly under the terms and conditions stated within this page.
Proof of Concept (PoC) Requirements
A PoC, demonstrating the bug's impact, is required for this program and has to comply with the [https://immunefisupport.zendesk.com/hc/en-us/articles/9946217628561-Proof-of-Concept-PoC-Guidelines-and-Rules?utm_source=immunefi](Immunefi PoC Guidelines and Rules).
Previous Audits
Parallel’s completed audit reports can be found at https://docs.mimo.capital/parallel-protocol/resources/security-audits?utm_source=immunefi. Any unfixed vulnerabilities mentioned in these reports are not eligible for a reward.
Auditor | Link | Completed at
| Bail Security | https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 31 January 2025 | Zenith | https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Parallel%20Protocol%20-%20Zenith%20Audit%20Report.pdf?utm_source=immunefi | 19 February 2025 | Bail Security | https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Certora | https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Certora_Report_Parallel_Parallelizer_BridgeToken_final.pdf?utm_source=immunefi | 30 April 2025 |
Auditor Bail Security
Completed at 31 January 2025
Auditor Zenith
Completed at 19 February 2025
Auditor Bail Security
Completed at 31 March 2025
Auditor Certora
Completed at 30 April 2025
Category | Description / Link | Last Updated At
| Smart Contract | Tokenomics/sPRL2.sol : Admin can drain any token from the sPRL2 contracthttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 1 February 2025 | Smart Contract | Tokenomics/sPRL2.sol : Missing unlockingAssets update in withdrawPRLAndWethhttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 1 February 2025 | Smart Contract | Tokenomics/TimelockPenaltyERC20.sol : Missing 0 address checkshttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 1 February 2025 | Smart Contract | Tokenomics/RewardMerkleDistributor.sol : No solvency check in 'updateMerkleDrop' functionhttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 1 February 2025 | Smart Contract | PRL-token/PrincipalMigrationContract.sol : Owner can mint/drain PRL Tokenshttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi | 1 February 2025 | Smart Contract | Tokenomics/SideChainFeeCollector.sol : The SideChainFeeCollector does not work correctly when the fee token has decimals other than 18.https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Parallel%20Protocol%20-%20Zenith%20Audit%20Report.pdf?utm_source=immunefi | 19 February 2025 | Smart Contract | Tokenomics/RewardMerkleDistributor.sol : 'updateMerkleDrop' safety check might end up not checking accurately.https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Parallel%20Protocol%20-%20Zenith%20Audit%20Report.pdf?utm_source=immunefi | 19 February 2025 | Smart Contract | parallel-parallelizer/Savings.sol : Bad governance settings can lead to loss/under-collateralization.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Savings.sol : Interest calculation is slightly underestimated.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Savings.sol : Function decimals will return the wrong value when the asset has less than 18 decimals.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Savings.sol : Burnt initial deposit accrues unrecoverable interest.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/LibOracle.sol : Oracles with hardcoded addresses will only work on Ethereum.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/LibOracle.sol : Missing min/max answer checks on Chainlink price feeds.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/LibOracle.sol : Circuit prices can have high errors.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/LibOracle.sol : Missing checks for sequencer uptime on rollups.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Swapper.sol : Quote functions don't revert when trying to burn more stablecoins than allowed.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Swapper.sol : Missing whitelisted check for quoting functions.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Swapper.sol : First minter can put the protocol in an extreme exposure towards one collateral.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Swapper.sol : DOS on mints when using USDM or stETH as managed collateral.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Setters : Zero or negative fees enable arbitrage via oracle deviations.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Setters : Admin can drain the system.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Setters : Setting a collateral manager with existing funds causes a temporary collateral ratio drop.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Setters : Zero fees enable exposure manipulation across collaterals.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/RewardHandler.sol : Function sellRewards will revert on Sonic due to hardcoded 1Inch router address.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/RewardHandler.sol : Guardian can self-sandwich sellRewards to steal most of the rewards.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/Redeemer.sol : Users might be forced into forfeiting a collateralhttps://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/DiamondProxy.sol : The system doesn't support fee-on-transfer tokens.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/MultiBlockHarvester.sol : Hardcoded addresses can break functionality on other chains.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/MultiBlockHarvester.sol : DOS Risk during harvest when a stablecoin depegs.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/GenericHarvester.sol : Harvesting will be DOSed while there are flashloan fees on TokenPhttps://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/GenericHarvester.sol : Rebalance interference between harvester contracts.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-parallelizer/BaseHarvester.sol : _computeRebalanceAmount doesn't completely rebalance the system.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-tokens/BridgeableTokenP.sol : If feesRate=0 bridge can be done repeatedly to DOS swaps from LZ -> principal token.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-tokens/BridgeableTokenP.sol : Fee rate changes can lead to unexpected number of received tokens.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 | Smart Contract | parallel-tokens/BridgeableTokenP.sol : LZ messages can be received (causing tokens to be credited) even when the contract is paused. https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi | 31 March 2025 |
Category Smart Contract
Description / Link Tokenomics/sPRL2.sol : Admin can drain any token from the sPRL2 contracthttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi
Last Updated At 1 February 2025
Category Smart Contract
Description / Link Tokenomics/sPRL2.sol : Missing unlockingAssets update in withdrawPRLAndWethhttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi
Last Updated At 1 February 2025
Category Smart Contract
Description / Link Tokenomics/TimelockPenaltyERC20.sol : Missing 0 address checkshttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi
Last Updated At 1 February 2025
Category Smart Contract
Description / Link Tokenomics/RewardMerkleDistributor.sol : No solvency check in 'updateMerkleDrop' functionhttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi
Last Updated At 1 February 2025
Category Smart Contract
Description / Link PRL-token/PrincipalMigrationContract.sol : Owner can mint/drain PRL Tokenshttps://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20PRL%20Token%20-%20Final%20Report%20-%20January%202025.pdf?utm_source=immunefi
Last Updated At 1 February 2025
Category Smart Contract
Description / Link Tokenomics/SideChainFeeCollector.sol : The SideChainFeeCollector does not work correctly when the fee token has decimals other than 18.https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Parallel%20Protocol%20-%20Zenith%20Audit%20Report.pdf?utm_source=immunefi
Last Updated At 19 February 2025
Category Smart Contract
Description / Link Tokenomics/RewardMerkleDistributor.sol : 'updateMerkleDrop' safety check might end up not checking accurately.https://github.com/parallel-protocol/parallel-prl/blob/main/docs/audits/Parallel%20Protocol%20-%20Zenith%20Audit%20Report.pdf?utm_source=immunefi
Last Updated At 19 February 2025
Category Smart Contract
Description / Link parallel-parallelizer/Savings.sol : Bad governance settings can lead to loss/under-collateralization.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Savings.sol : Interest calculation is slightly underestimated.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Savings.sol : Function decimals will return the wrong value when the asset has less than 18 decimals.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Savings.sol : Burnt initial deposit accrues unrecoverable interest.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/LibOracle.sol : Oracles with hardcoded addresses will only work on Ethereum.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/LibOracle.sol : Missing min/max answer checks on Chainlink price feeds.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/LibOracle.sol : Circuit prices can have high errors.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/LibOracle.sol : Missing checks for sequencer uptime on rollups.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Swapper.sol : Quote functions don't revert when trying to burn more stablecoins than allowed.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Swapper.sol : Missing whitelisted check for quoting functions.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Swapper.sol : First minter can put the protocol in an extreme exposure towards one collateral.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Swapper.sol : DOS on mints when using USDM or stETH as managed collateral.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Setters : Zero or negative fees enable arbitrage via oracle deviations.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Setters : Admin can drain the system.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Setters : Setting a collateral manager with existing funds causes a temporary collateral ratio drop.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Setters : Zero fees enable exposure manipulation across collaterals.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/RewardHandler.sol : Function sellRewards will revert on Sonic due to hardcoded 1Inch router address.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/RewardHandler.sol : Guardian can self-sandwich sellRewards to steal most of the rewards.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/Redeemer.sol : Users might be forced into forfeiting a collateralhttps://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/DiamondProxy.sol : The system doesn't support fee-on-transfer tokens.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/MultiBlockHarvester.sol : Hardcoded addresses can break functionality on other chains.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/MultiBlockHarvester.sol : DOS Risk during harvest when a stablecoin depegs.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/GenericHarvester.sol : Harvesting will be DOSed while there are flashloan fees on TokenPhttps://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/GenericHarvester.sol : Rebalance interference between harvester contracts.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-parallelizer/BaseHarvester.sol : _computeRebalanceAmount doesn't completely rebalance the system.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-tokens/BridgeableTokenP.sol : If feesRate=0 bridge can be done repeatedly to DOS swaps from LZ -> principal token.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-tokens/BridgeableTokenP.sol : Fee rate changes can lead to unexpected number of received tokens.https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
Category Smart Contract
Description / Link parallel-tokens/BridgeableTokenP.sol : LZ messages can be received (causing tokens to be credited) even when the contract is paused. https://github.com/parallel-protocol/parallel-parallelizer/blob/main/docs/audits/Bailsec%20-%20Parallel%20Protocol%20-%20V3%20Core%20-%20Final%20Report.pdf?utm_source=immunefi
Last Updated At 31 March 2025
The submission of KYC information is a requirement for payout processing.
Participants must adhere to the Eligibility Criteria.
Proof of concept is always required for all severities.
Category 1: Transparent
Default prohibited activities
Any testing on mainnet or public testnet deployed code; all testing should be done on local-forks of either public testnet or mainnet
Any testing with pricing oracles or third-party smart contracts
Attempting phishing or other social engineering attacks against our employees and/or customers
Any testing with third-party systems and applications (e.g. browser extensions) as well as websites (e.g. SSO providers, advertising networks)
Any denial of service attacks that are executed against project assets
Automated testing of services that generates significant amounts of traffic
Public disclosure of an unpatched vulnerability in an embargoed bounty
[https://immunefi.com/rules/](Any other actions prohibited by the Immunefi Rules)
The project may be receiving reports that are valid (the bug and attack vector are real) and cite assets and impacts that are in scope, but there may be obstacles or barriers to executing the attack in the real world. In other words, there is a question about how feasible the attack really is. Conversely, there may also be mitigation measures that projects can take to prevent the impact of the bug, which are not feasible or would require unconventional action and hence, should not be used as reasons for downgrading a bug's severity.
Therefore, Immunefi has developed a set of feasibility limitation standards which by default states what security researchers, as well as projects, can or cannot cite when reviewing a bug report.
[https://immunefisupport.zendesk.com/hc/en-us/articles/19430444320401-Pre-Impact-Bug-Monitoring?utm_source=immunefi](Pre-Impact Bug Monitoring)
[https://immunefisupport.zendesk.com/hc/en-us/articles/17243068885265-Attack-Investment-Amount?utm_source=immunefi](Attack Investment Amount)
[https://immunefisupport.zendesk.com/hc/en-us/articles/17454897136401-Attacks-With-A-Financial-Risk-To-The-Attacker?utm_source=immunefi](Attacks With A Financial Risk To The Attacker)
[https://immunefisupport.zendesk.com/hc/en-us/articles/17455102268305-When-Is-An-Impactful-Attack-Downgraded-To-Griefing?utm_source=immunefi](When Is An Impactful Attack Downgraded To Griefing?)
[https://bugs.immunefi.com/dashboard/new-submission?utm_source=immunefi](Submit a Bug) [/bug-bounty/parallel/scope/#assets](Total Assets in Scope172 )