Hyperbridge Now Offering $50K for Hackers to Find Bugs After Exploit

Hyperbridge launches $50K bug bounty after bridge exploit

Hyperbridge is now offering rewards of up to $50,000 to security researchers who find and report critical bugs in their system. The program is hosted on HackenProof.

Summary

  • Hyperbridge offers $50,000 rewards for critical bugs as researchers review cross-chain messaging and fund safety.
  • The program follows April’s fake DOT exploit that exposed proof verification risks across Hyperbridge systems.
  • HackenProof rules require proof-of-concept reports while banning live attacks and third-party exploit testing by researchers.

We encourage security experts to examine our code and report any vulnerabilities they find using our security platform.

HackenProof shows the Hyperbridge Protocol program is currently running. Hyperbridge is designed to allow different blockchains to connect and securely share assets by using a new method based on agreement and verified data, instead of traditional bridges that depend on groups managing multiple signatures.

Rewards cover key bridge risks

Hyperbridge offers bug bounty rewards starting at $200 for minor issues. More serious problems can earn between $2,000 and $5,000, while critical vulnerabilities could pay up to $50,000. Rewards for high-severity bugs range from $5,000 to $15,000.

This review covers the entire Hyperbridge protocol codebase. The team encourages researchers to report any vulnerabilities they find, including problems with how the system handles logic, access, security, cross-chain communication, data, and the safety of messages or funds.

April exploit pushed security review

Following a security breach in April, an attacker created approximately 1 billion counterfeit tokens with the value of DOT on the Ethereum blockchain using Hyperbridge’s system for transferring assets between blockchains. According to Crypto.news, the attacker compromised admin access by creating a fake message for cross-chain communication and stole around $237,000 worth of ether.

In my research, the report indicated that the inflated supply only impacted the DOT tokens on the bridged chain, leaving Polkadot’s main network secure. The incident seems to be part of a larger pattern of risks associated with bridges – specifically, vulnerabilities stemming from fabricated messages and insufficient verification processes. These weaknesses continue to be frequent entry points for attackers.

Hyperbridge also requires that all testing be done on local copies of the system. Attempts to attack live systems, use social engineering, or exploit vulnerabilities through third parties are not covered by the program.

As a researcher participating in the HackenProof program, I understand that I need to submit working proof-of-concept examples with my findings. The program also has clear guidelines: I can’t disrupt services, attempt to access personal data, send spam, or conduct denial-of-service testing. Theoretical reports aren’t accepted either. Importantly, I’m required to stay within the defined scope of the program and must get approval before publicly disclosing any vulnerabilities I discover.

Cross-chain use case remains active

Hyperbridge was previously mentioned in crypto.news articles. Back in May 2025, Enjin Blockchain tested Hyperbridge on a test network to enable stablecoin transfers (USDC and USDT) between Ethereum and BNB Chain.

The previous example highlighted the importance of bridge security. These systems allow users to lock up digital assets on one blockchain and receive an equivalent amount on a different one. However, if the system’s verification processes don’t work correctly, a problem in one part of the bridge can potentially affect the entire cross-chain network. This new reward program encourages thorough examination of Hyperbridge’s code, helping the protocol to prevent similar issues from happening again.

Read More

2026-05-15 14:33