{"id":17627,"date":"2026-02-24T23:13:47","date_gmt":"2026-02-24T23:13:47","guid":{"rendered":"https:\/\/cryptoted.net\/index.php\/2026\/02\/24\/ethereum-protocol-attackathon-is-live\/"},"modified":"2026-02-24T23:13:47","modified_gmt":"2026-02-24T23:13:47","slug":"ethereum-protocol-attackathon-is-live","status":"publish","type":"post","link":"https:\/\/cryptoted.net\/index.php\/2026\/02\/24\/ethereum-protocol-attackathon-is-live\/","title":{"rendered":"Ethereum Protocol Attackathon is Live"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"\">\n<p class=\"chakra-text css-gi02ar\">The <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/github.com\/ethereum\/protocol-security\">Protocol Security Research Team<\/a> and the Ecosystem Funding Initiative at the Ethereum Foundation are pleased to announce the <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/immunefi.com\/audit-competition\/ethereum-protocol-attackathon\/\">launch of the first Ethereum protocol Attackathon<\/a> with a reward pool of <strong>$1,500,000<\/strong>, hosted by <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/immunefi.com\/\">Immunefi<\/a>. The attackathon runs between November 25th and January 20th and aims to enhance the security of the Ethereum protocol through a large-scale crowdsourced security audit competition.<\/p>\n<p class=\"chakra-text css-gi02ar\">We invite the entire Ethereum community \u2014 from auditing firms to individual security researchers \u2014 to participate in this important event to help secure the Ethereum Protocol.<\/p>\n<p class=\"chakra-text css-gi02ar\">You can get started on your journey into understanding the Ethereum Protocol via live and pre-recorded technical walkthroughs through the <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/immunefi.com\/academy\/ethereum-protocol-attackathon\/\">Academy<\/a>.<\/p>\n<p class=\"chakra-text css-gi02ar\">The Attackathon is co-sponsored by:<\/p>\n<ul role=\"list\" class=\"css-1ars4k6\">\n<li class=\"css-0\">Bybit<\/li>\n<li class=\"css-0\">Wormhole<\/li>\n<li class=\"css-0\">Arbitrum<\/li>\n<li class=\"css-0\">The Graph<\/li>\n<li class=\"css-0\">GMX<\/li>\n<li class=\"css-0\">Base<\/li>\n<\/ul>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"what-is-an-attackathon\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"what is an attackathon permalink\" href=\"#what-is-an-attackathon\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>What is an Attackathon?<\/h2>\n<p class=\"chakra-text css-gi02ar\">The Attackathon is a time-bound audit challenge to bolster the security of the Ethereum protocol. It begins with an educational phase where participants receive instruction on the protocol\u2019s code via live technical walkthroughs and educational content from the Attackathon Academy. This phase ensures that participants are well-prepared to identify and understand potential vulnerabilities.<\/p>\n<p class=\"chakra-text css-gi02ar\">During the Attackathon, security researchers will actively search for vulnerabilities in the protocol\u2019s code. They will follow specific rules set for the competition, and only impactful and rule-compliant reports will be rewarded. This phase focuses on real-time problem-solving and applying the knowledge gained during the initial phase.<\/p>\n<p class=\"chakra-text css-gi02ar\">After the Attackathon, Immunefi will evaluate and compile the findings into an official report. This report will detail the vulnerabilities discovered and highlight the top researchers, celebrating their contributions and expertise.<\/p>\n<h2 class=\"chakra-heading group css-1kpzc4q\" id=\"interested-in-working-full-time-in-public-good-security\" data-group=\"true\"><a class=\"chakra-link css-128fqrf\" aria-label=\"interested in working full time in public good security permalink\" href=\"#interested-in-working-full-time-in-public-good-security\"><svg viewbox=\"0 0 24 24\" focusable=\"false\" class=\"chakra-icon css-173jpr1\"><g fill=\"currentColor\"><path d=\"M10.458,18.374,7.721,21.11a2.853,2.853,0,0,1-3.942,0l-.892-.891a2.787,2.787,0,0,1,0-3.941l5.8-5.8a2.789,2.789,0,0,1,3.942,0l.893.892A1,1,0,0,0,14.94,9.952l-.893-.892a4.791,4.791,0,0,0-6.771,0l-5.8,5.8a4.787,4.787,0,0,0,0,6.77l.892.891a4.785,4.785,0,0,0,6.771,0l2.736-2.735a1,1,0,1,0-1.414-1.415Z\"\/><path d=\"M22.526,2.363l-.892-.892a4.8,4.8,0,0,0-6.77,0l-2.905,2.9a1,1,0,0,0,1.414,1.414l2.9-2.9a2.79,2.79,0,0,1,3.941,0l.893.893a2.786,2.786,0,0,1,0,3.942l-5.8,5.8a2.769,2.769,0,0,1-1.971.817h0a2.766,2.766,0,0,1-1.969-.816,1,1,0,1,0-1.415,1.412,4.751,4.751,0,0,0,3.384,1.4h0a4.752,4.752,0,0,0,3.385-1.4l5.8-5.8a4.786,4.786,0,0,0,0-6.771Z\"\/><\/g><\/svg><\/a>Interested in working full time in Public Good Security?<\/h2>\n<p class=\"chakra-text css-gi02ar\">The Ethereum Foundation&#8217;s Protocol Security Research team is now looking for two Security Engineers: <a target=\"_blank\" rel=\"noopener\" class=\"chakra-link css-vezwxf\" href=\"https:\/\/jobs.lever.co\/ethereumfoundation\/b168a95b-3292-4db5-9afd-06f3023ad2c0?lever-origin=applied&amp;lever-source%5B%5D=Blog%20Post\">Apply<\/a><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.ethereum.org\/en\/2024\/11\/25\/ethereum-protocol-attackathon\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Protocol Security Research Team and the Ecosystem Funding Initiative at the Ethereum Foundation are pleased to announce the launch of the first Ethereum protocol Attackathon with a reward pool of $1,500,000, hosted by Immunefi. The attackathon runs between November 25th and January 20th and aims to enhance the security of the Ethereum protocol through [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"tdm_status":"","tdm_grid_status":"","footnotes":""},"categories":[24],"tags":[],"kronos_expire_date":[],"class_list":["post-17627","post","type-post","status-publish","format-standard","hentry","category-ethereum"],"_links":{"self":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/17627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/comments?post=17627"}],"version-history":[{"count":0,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/posts\/17627\/revisions"}],"wp:attachment":[{"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/media?parent=17627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/categories?post=17627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/tags?post=17627"},{"taxonomy":"kronos_expire_date","embeddable":true,"href":"https:\/\/cryptoted.net\/index.php\/wp-json\/wp\/v2\/kronos_expire_date?post=17627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}