The Hyperbridge incident is prompting the right conversation about which projects the ecosystem should continue supporting and on what terms. I want to extend that conversation, because Hyperbridge is not the only project exhibiting a signature that correlates with eventual compromise, and the broader question deserves attention while the window for acting on it is open.
Standing:
I was an Immunefi whitehat and participated in multiple programs, including Hydrationâs. Iâm no longer active on Immunefi for reasons Iâll document separately; those reasons are not relevant to what Iâm raising here. Immunefiâs Terms of Service permit public disclosure when a program violates its service level agreements, and what Iâm describing below is within that scope.
The specific claim:
Hydration violated Immunefiâs 96-hour acknowledgment SLA on a report I submitted. The subsequent SLAs after acknowledgement are "verdict of triage (valid or invalid) - 7 days, and payment -7 days. Hydration breached all 3. The violation was sustained for weeks. I eventually withdrew the report because continued engagement with a non-responsive program was not productive use of my time. I had draft reports that were waiting on standy and were not submitted, which is standard practice to not flood the program but instead wait for acknowledgement of the first report before moving forward.
I am not describing the contents of the report, the specific vulnerability, or making any claim about what was or was not exploitable in Hydrationâs code, or that the program confirmed the report was valid or not. What Iâm describing is the programâs behavior toward a researcher operating in good faith through the platformâs intended channels.
The pattern:
Sustained non-engagement by a bounty program is not neutral. It correlates with eventual compromise, and this is not a theoretical correlation.
Vercel exhibited the same signature prior to their recent critical breach: in-scope codebase, active bounty program, reports that sat unaddressed. I watched that pattern play out and called it at the time. The breach arrived on schedule. I am not claiming that every non-responsive program is breached, and I am not claiming any specific vulnerability exists in Hydrationâs codebase today. I am claiming that the pattern itself is a security signal that ecosystem stakeholders should weigh, and that the signal is currently present.
Why this matters beyond Hydration specifically
Hydration received protocol inflation as yield. That funding relationship is different from an unaffiliated project running a bounty program as standard due diligence. When ecosystem-level resources flow to a project, that projectâs security posture becomes an ecosystem-level concern, and the standards applied should reflect that.
A project that benefits from treasury or protocol-level support should at minimum meet the disclosure standards that independent projects meet voluntarily. When it doesnât, the absence is a data point the ecosystem should surface and act on.
What Iâm asking the Fellowship, Web3F, and treasury stakeholders to consider:
Iâm not asking that any specific project be cut off. Im stating concern because I am vested in the healthy stewardship of the Polkadot ecosystem both technically and economically.