The CCTP held true amid intense hacking from multiple teams
On May 29th, aelf launched phase 1 of the hacker bounty with a reward amount of 88,888 ELF based on the Cross-Chain Transfer Protocol (CCTP).
The Cross-Chain Transfer Protocol (CCTP) ensures the security of users’ assets when conducting on-chain transactions. If any hacker was able to breach the cross-chain transfer protocol (CCTP) successfully and swap the ELF Test Tokens to their own account address during the event, the aelf foundation would reward them with the equivalent amount in ERC20 ELF Tokens. This bounty activity specifically targeted the cross-chain transfer protocol (CCTP). Other areas such as vulnerabilities on Ethereum or other areas of the aelf project were not included.
As of June 5th, no hackers had successfully stolen the ELF Token, so no one could win the 88,888 ELF Token.
aelf held Phase 1 of the Hacker Bounty in order to demonstrate the security of the Cross-Chain Transfer Protocol (CCTP) and its corresponding lock-in contract. This event encouraged users to gain a comprehensive understanding of the CCTP and was conducted as a Bounty Project by the aelf DAO to ensure transparency in execution and payment.
Phase 2 of the Hacker Bounty will launch soon with a much more substantial reward pool. The specific time and details of the event will be announced in the official aelf community and we look forward to challenging hackers from around the world!
— Join the Community:
· Read weekly articles on the aelf blog
· Catch up with the develop progress on Github
· Instagram: aelfblockchain
· YouTube Channel: aelf
For more information, visit aelf.io