If you believe you have found a security vulnerability in Gensyn Foundation — whether in our smart contracts, landing page, blog, or supporting infrastructure — please report it responsibly.
Email: info@gensynfoundation.org
You must send reports using our PGP key:
-----BEGIN PGP PUBLIC KEY BLOCK-----
mDMEafPNFBYJKwYBBAHaRw8BAQdAi6Yh5LXhuZ4Ff5GkBCfBXDnxtM8FLD4zBLsk
WNrev7e0NkdlbnN5biBGb3VuZGF0aW9uIFNlY3VyaXR5IDxpbmZvQGdlbnN5bmZv
dW5kYXRpb24ub3JnPoi1BBMWCgBdFiEEDccU2/GufcPEzMrGmbBiumaoza0FAmnz
zRQbFIAAAAAABAAObWFudTIsMi41KzEuMTIsMCwzAhsDBQkDwmcABQsJCAcCAiIC
BhUKCQgLAgQWAgMBAh4HAheAAAoJEJmwYrpmqM2t7xUA/1wYj4IF/iz5YPLoEy+e
J4YqMlitisAzJtx3T+2z8mhzAP95jzaVUwSn9sfwKez5+164rs9k15f5WULSRZOe
IryfALg4BGnzzRQSCisGAQQBl1UBBQEBB0DFTwvCvbkbzPxl6B+KGVzx/9MLTC0b
lZ1gIJMM1dX7QwMBCAeImgQYFgoAQhYhBA3HFNvxrn3DxMzKxpmwYrpmqM2tBQJp
880UGxSAAAAAAAQADm1hbnUyLDIuNSsxLjEyLDAsMwIbDAUJA8JnAAAKCRCZsGK6
ZqjNrcg6AQD7UT0NzASg3FuA+o9KLTAw9JT4+iUetgPc0GfDhAN9ogEArbxT1G1J
kH+RFVtUN4aM6O2LoAr5p3QC6vAPV3QRaQ8=
=3UYx
-----END PGP PUBLIC KEY BLOCK-----
Do not open a public GitHub issue for security vulnerabilities.
This page covers only the landing page, blog, and smart contracts listed below. Anything not listed here is out of scope for this disclosure channel.
Gensyn Foundation smart contracts are deployed on the Gensyn Foundation network (EVM-compatible, Solidity 0.8.30). Core contracts include:
| Contract | Mainnet Address |
|---|---|
| BuyBack Vault Proxy | 0x2CBEE00F91A2BC50a7D5C53DFfa6BAB79d7E0243 |
| BuyBack Vault Timelock | 0x6292B830DC9AaB0988bBf7BFcd31A75Cdc106187 |
| BuyBack Vault Timelock Proposer | 0xaa11F69F612cEae5bE1f8f64a94E745bC33280be |
Issues of interest include but are not limited to:
DynamicParimutuelMath that enable value extraction.Clones.clone()).We follow a coordinated disclosure model:
We may not respond to every report individually, but we read all of them. If your report describes a critical or high-severity issue, you will hear from us.
Gensyn Foundation will not pursue legal action against security researchers who:
We use the following severity levels when triaging reports:
| Severity | Examples |
|---|---|
| Critical | Direct theft of user funds; unauthorized minting or burning of positions; manipulation of market settlement |
| High | Permanent freezing of funds; griefing attacks that block market settlement or redemption; economic exploits via rounding or precision errors |
| Medium | Temporary denial of service against specific markets; minor economic inefficiency exploitable under narrow conditions |
| Low | Theoretical issues requiring unrealistic preconditions; gas optimization issues |