Complete Audit Cycle
With Complete Audit Cycle, security researchers can earn additional rewards by delivering more comprehensive and ready-to-use solutions to sponsors through fixes and tests.
Complete Audit Cycle leverages researchers' expertise in the projects they secure by:
Enabling add-ons like fixes and tests for vulnerability submissions
Allowing peer review of fixes by qualified researchers
Delivering project-standard code that’s production-ready
Creating consistent income paths for long-term contributors
Reducing stress in the reward process for dependable contributors
Who Can Submit: Top 20% of researchers ($5,000+ in earnings)
Impact: We're building tools for decentralized secure development in which researchers not only find issues but also fix them.
This feature enriches the overall audit process, making it more valuable to sponsors while rewarding researchers who invest time and skill into making solutions that are thorough and actionable.
How the Complete Audit Cycle Works
To be able to send fixes and tests, a researcher must be among the top 20% on the leaderboard with $5,000+ in earned rewards on Hats. Qualified researchers can:
Claim Fixes and Tests: Following any vulnerability submission marked for enhancement, top contributors can claim the opportunity to provide the fix and/or test.
Submit Complete Solutions: Researchers who claim a fix have 12 hours to submit the complete fix and accompanying test. Fixes must follow the project's code style for quality and consistency.
Earn Rewards: For each complete fix and test, points and rewards are provided. This allows researchers to elevate their earnings by completing solutions that enhance overall security.
Core Fix Requirements:
Fully addresses identified vulnerability
Matches project's code style and patterns
Includes targeted tests covering vulnerability
Maintains existing interfaces and performance
Changes focused only on vulnerability fix
Core Test Requirements:
Demonstrates vulnerability existence pre-fix
Verifies fix prevents vulnerability post-fix
Covers core edge cases related to vulnerability
Uses project's testing framework and patterns
Acceptance Criteria:
Fix directly addresses reported vulnerability
Tests prove vulnerability is fixed
Code follows project standards
Changes are minimal and focused
Documentation clear and complete
Fix/Test Rejection Valid Only If:
Does not fix vulnerability
Introduces new security risks
Breaks existing functionality
Severely impacts performance
Fails to follow project standards
Note: Focus is on proving vulnerability fix effectiveness. Additional edge cases may be suggested but cannot be the sole basis for rejection if core vulnerability is properly addressed and tested.
The Point System
To incentivize comprehensive reports, the complete audit cycle will offer a tiered point structure:
Extra Points for Fix An additional 10% of the initial report points for an accepted fix (tagged as complete by the sponsor)
Extra Points for Test (only if the issue requires a test): An additional 5% of the initial report points for an accepted fix (tagged as complete by the sponsor)
Let's explore an example of how the pointing system works:
In this reference, researchers receive 1 point per Low finding. That means 1 Low Fix will equal 0.1 extra points (10% of low issue points).
In cases where a Test isn’t applicable, submitters can check the “Test not applicable” option. Points for completed Tests and fixes are pooled into the total reward for the competition, allowing participants to benefit without additional funding from project sponsors.
Last updated