Reporting a Vulnerability

If you believe you have found a security vulnerability in Gensyn Foundation — whether in our smart contracts, landing page, blog, or supporting infrastructure — please report it responsibly.

Email: info@gensynfoundation.org

You must send reports using our PGP key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3UYx
-----END PGP PUBLIC KEY BLOCK-----

Do not open a public GitHub issue for security vulnerabilities.

What to Include

Scope

This page covers only the landing page, blog, and smart contracts listed below. Anything not listed here is out of scope for this disclosure channel.

Smart Contracts

Gensyn Foundation smart contracts are deployed on the Gensyn Foundation network (EVM-compatible, Solidity 0.8.30). Core contracts include:

Contract Mainnet Address
BuyBack Vault Proxy 0x2CBEE00F91A2BC50a7D5C53DFfa6BAB79d7E0243
BuyBack Vault Timelock 0x6292B830DC9AaB0988bBf7BFcd31A75Cdc106187
BuyBack Vault Timelock Proposer 0xaa11F69F612cEae5bE1f8f64a94E745bC33280be

Issues of interest include but are not limited to:

Disclosure Policy

We follow a coordinated disclosure model:

  1. Triage. Reports are reviewed by the security team. We prioritize by severity — critical smart contract vulnerabilities (fund loss, unauthorized state changes) are triaged immediately; lower-severity issues are assessed as capacity allows.
  2. Remediation. Confirmed vulnerabilities are remediated as rapidly as possible, with critical issues taking precedence. For critical smart contract vulnerabilities, we may deploy emergency mitigations — including contract pauses — before the full fix is complete.
  3. Coordination. We will coordinate with you on a disclosure timeline. We ask that you give us a reasonable window — generally 90 days for non-critical issues, shorter for critical issues with active exploitation risk — before any public disclosure.
  4. Credit. With your permission, we will publicly credit you for the discovery in any advisory or post-mortem we publish.

We may not respond to every report individually, but we read all of them. If your report describes a critical or high-severity issue, you will hear from us.

Safe Harbor

Gensyn Foundation will not pursue legal action against security researchers who:

Severity Classification

We use the following severity levels when triaging reports:

Severity Examples
Critical Direct theft of user funds; unauthorized minting or burning of positions; manipulation of market settlement
High Permanent freezing of funds; griefing attacks that block market settlement or redemption; economic exploits via rounding or precision errors
Medium Temporary denial of service against specific markets; minor economic inefficiency exploitable under narrow conditions
Low Theoretical issues requiring unrealistic preconditions; gas optimization issues

Contact