-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Description
Zero-Knowledge Proof for Bug Bounties
As a white hat hacker, I want to prove that I have found a significant bug within a system without revealing the specifics of the vulnerability or my identity. This allows me to claim a bounty for my discovery while maintaining the confidentiality and security of the system until a patch has been implemented.
Acceptance Criteria
- Hacker can generate a zero-knowledge proof that validates the existence of the bug without revealing any details.
- The zero-knowledge proof can be verified by the bounty program organizers.
- The verification process does not reveal any information about the bug to the organizers.
- The system ensures the anonymity of the hacker.
- The proof is tied to the specific bug bounty scope and rules.
- The bounty can be claimed using the verified proof without further disclosure.
- The proof prevents multiple claims for the same bug (uniqueness).
- The process adheres to cryptographic standards and is computationally reasonable.
sequenceDiagram
participant Hacker
participant ZKProofSystem
participant BountyOrganizer
Hacker->>ZKProofSystem: Generate proof of bug
ZKProofSystem->>Hacker: Proof generated
Hacker->>BountyOrganizer: Submit proof
BountyOrganizer->>ZKProofSystem: Verify proof
ZKProofSystem->>BountyOrganizer: Proof verified