← Back to blog

Historical Top Immunefi Payouts: The Biggest Bounties in Web3 Security

A $10M disclosure prevented a $736M loss. A $2.2M disclosure prevented a $22B one. The leaderboard is a working market — for one specific shape of problem.

Published May 2026 · 12 min read

On February 24, 2022, a security researcher who goes by satya0x looked at a smart contract holding $736 million and made a choice.

The bug was an uninitialized proxy in the Wormhole bridge on Ethereum. By calling SELFDESTRUCT on the implementation contract, an attacker could brick the proxy permanently — every dollar of bridged assets, frozen forever. Not stolen. Worse than stolen: hostage. Unrecoverable. A protocol shaped like a vault with the lock welded shut from the inside.

satya0x submitted the bug through Immunefi’s dashboard. Wormhole patched it the same day. The payout — $10 million, the maximum for Wormhole’s critical tier — became the largest single bug bounty in software history at the time of payment.

That decision — to disclose for $10M instead of holding $736M for ransom — is the moment around which the modern Web3 security economy organized itself. Four years later, Immunefi has paid out more than $110 million to ethical hackers across 3,000+ reports, 94% of long-running programs have surfaced at least one critical vulnerability, and the bounty ceiling has climbed from satya0x’s $10M to a $16M maximum currently posted by Usual on Sherlock.

The leaderboard reads like a sampler of every way smart contracts can fail.


The Hall

Rank the top individual payouts and a taxonomy emerges:

RankAmountProtocolResearcherBug
1$10,000,000Wormholesatya0xUninitialized proxy (Feb 2022)
2$6,000,000Aurorapwning.ethInfinite ETH minting (Jun 2022)
3$3,000,000(embargoed)ily2Critical smart contract (2025)
4$2,200,000PolygonLeon SpacewalkerMissing balance check (Dec 2021)
5$2,000,042OptimismJay Freeman (Saurik)SELFDESTRUCT duplication (Feb 2022)
6$2,000,000PolygonGerhard WagnerPlasma Bridge double-spend (Oct 2021)
7$1,050,000Moonbeampwning.ethCritical contract bug (Sep 2022)

Three of the top seven are bridge bugs. Two are infinite-mint or duplication flaws. Two are missing-check arithmetic failures so basic they’d embarrass an undergraduate — except they were sitting inside protocols custodying tens of billions of dollars.

The Polygon MRC20 bug Leon Spacewalker reported in December 2021 was the most consequential of the lot. A missing balance/allowance check in the transfer function meant an attacker could have stolen all 9.27 billion MATIC tokens — the entire supply — worth approximately $22 billion at the time. The bug was found, fixed, and a malicious actor was caught mid-exploit having taken only 801,601 MATIC (~$2 million) before the patch deployed. Polygon paid Spacewalker $2.2 million and a second whitehat who’d independently surfaced the same bug another 500,000 MATIC. The cost of the disclosure: about 0.01% of the value at risk.


The Archetypes

The researchers who keep showing up on the leaderboard fall into a small number of distinct shapes.

The Specialist. LonelySloth — 60 paid reports, $3.6 million total, hunting professionally since 2019. High volume, consistent medium-to-high findings. The grinder who treats bug bounty work as a real job and is paid accordingly. The closest thing the system has to a career path.

The Sniper. ily2 — three reports submitted, three reports paid, $3 million in total earnings. A 100% acceptance rate at an average of $1 million per submission. ily2 only files when certain of critical impact. Where LonelySloth runs a portfolio, ily2 runs a thesis fund: high conviction, low frequency, extreme expected value per shot.

The Cross-Domain Expert. Jay Freeman, better known as Saurik, the iOS jailbreak community’s creator of Cydia. His Optimism bug found SELFDESTRUCT returning ETH to the sender on L2 while keeping the corresponding off-chain IOU — infinite duplication of L2 ETH that could be bridged out as real assets. The bug existed because the protocol’s designers thought in EVM semantics; Freeman thought in iOS-style “what does the runtime actually do when you ask it nicely?” semantics. He earned $2,000,042 and a footnote in EIP-6780, which eventually deprecated SELFDESTRUCT’s fund-clearing behavior.

The Multi-Protocol Hunter. pwning.eth — $6M from Aurora in June 2022, $1.05M from Moonbeam three months later, $7M+ cumulative. The pattern is recognizable: identify a vulnerability class (here, infinite-mint flaws at bridge boundaries) and apply it across protocols that share the architecture. The exploit is generic; the protocol is the variable.

These archetypes matter because they describe the actual labor market that bug bounties created. There are roughly 45,000 registered researchers on Immunefi and $110 million has been distributed across them. The mean per-researcher earning is about $2,400. The median is almost certainly zero. Roughly 24% of all payouts ever made on the platform went to the top seven individual bounties named above. This is not a normal distribution. It’s not even a Pareto distribution. It’s a power law steeper than most other reward markets — closer to lottery jackpots or venture-stage equity than to freelance programming or competitive sports.


The Calculus

Why does anyone disclose? The economics, written out, are surprisingly clean. Each top payout represents a researcher who confronted the same matrix:

FactorDisclosureExploitation
PayoutBounded, typically a small fraction of TVLUp to full TVL, minus laundering haircut
IdentityKYC required for $1M+ payoutsPseudonymous, but address-traceable
Legal riskZeroCriminal prosecution; OFAC sanctions if the protocol is in scope
CertaintyGuaranteed if severity is agreedExploit may fail; funds may be frozen
CareerLeaderboard, All Stars program, recurring incomeOne shot, no portfolio, blacklisting
Recovery rate (Q1 2025)N/A0.4%

That last row is the one that changed most dramatically over the past three years. In Q1 2024, roughly 21.2% of stolen funds were recovered through asset freezes, exchange seizures, and white-hat counter-exploits. In Q1 2025, the figure collapsed to 0.4%. The post-exploit recovery option, never reliable, has effectively died. The trend lines have crossed: disclose-and-collect is now not just rational but the only path that pays at all if the alternative ends in laundering through North Korean mixers.

The aggregate return on this system is the strongest economic argument in security. Add up just four top payouts — Wormhole, Aurora, Polygon MRC20, Optimism — and you get $20.2 million in bounties paid against $23.3 billion in losses prevented. That’s a ratio above 1,100×. Not 1,100% — 1,100×. Bug bounties are arguably the highest-ROI security spend in any industry, anywhere, ever, by a wide margin. The CTO of a Fortune 500 explaining a $50M security budget to the board could replace half of it with a single critical-tier bounty pool and statistically come out ahead.

That argument is correct. It is also incomplete.


The Paradox

On February 21, 2025, North Korean actors associated with the Lazarus Group drained approximately $1.5 billion from Bybit — roughly 401,000 ETH, the largest single digital-asset theft in history. The attackers did not exploit smart contract code. They compromised Safe{Wallet} by injecting malicious JavaScript into its AWS repository four days earlier. The exploit traveled through the front-end, not the chain. The funds were extracted because a UI lied to the signer about what they were signing.

2025 was the worst year for crypto hacks on record. $3.4 billion stolen, average loss per incident of $5.32 million (up 66.6% year-over-year). In Q1 2025 alone, 88% of stolen value came from private key compromises — operational and people failures, not smart contract bugs. Immunefi’s own CEO Mitchell Amador said the quiet part publicly: the worst year for crypto hacks “wasn’t a smart contract problem — it was a people problem.”

Sit with that. The bug bounty system is winning. 94% of long-running programs surface at least one critical vulnerability. The bounty ceiling rose 60% in four years. Researcher count climbs every quarter. And in the same window, the threat surface migrated underneath the system. The bugs that bounties are designed to catch — smart contract vulnerabilities, reentrancy flaws, arithmetic errors — have receded into a shrinking share of total loss. The bugs that now move billions live in CI/CD pipelines, AWS IAM roles, browser extensions, hardware signing flows, and the social engineering of operations staff. Bug bounty programs are structurally poorly designed to catch these. The vulnerability isn’t in code that can be statically reviewed; it’s in the gap between what a signer sees and what their wallet broadcasts.

The juxtaposition is unforgiving. Wormhole’s $10M bounty prevented a $736M loss. The cumulative bounty payouts in Immunefi’s entire history total $110M — less than 8% of what one state actor stole from one exchange in one day in 2025. The OWASP Smart Contract Top 10 reflects the same shift: reentrancy fell from #1 in 2025 to #8 in 2026; access control failures — which are usually off-chain key management problems wearing a smart-contract costume — sit at #1 with $953M in losses. The classic “DeFi got hacked because of a bug” headline is increasingly false. DeFi gets hacked because someone’s laptop got phished.


The Arms Race

The system is responding. Bounty ceilings have climbed: $10M (2022) → $15M (LayerZero, 2023) → $16M (Usual on Sherlock, 2026). Platform competition between Immunefi, Sherlock, Code4rena, and Cantina has turned bounty size into a public signaling mechanism for protocol seriousness, the way credit ratings became branding for industrial companies in the 1980s. Uniswap v4’s hooks model — a system that lets developers extend pool behavior with custom logic — already has $11M in real exploits (Cork Protocol, May 2025; z0r0z V4 Router, March 2026) and seven documented vulnerability classes. The $15.5M bounty on Uniswap v4 is being live-tested against an actual hostile environment.

Immunefi itself launched the IMU token in January 2026, financializing aspects of the security marketplace. Researchers can now hold equity-like exposure to platform growth, not just collect lump-sum bounties. Whether this strengthens incentive alignment or distorts it is genuinely open; tokenization tends to do both at once, and we don’t yet have enough cycles of data to call it.


Where the Frame Breaks

Three honest concessions.

First, the leaderboard is survivorship-biased. We only see bugs that were reported. There is no way to know how many critical vulnerabilities were quietly exploited and never traced, especially in the pre-Chainalysis era. The $3 billion+ figures for annual losses count what investigators could attribute. The dark figure — exploits that look like rugpulls, exit scams, or “lost private keys” — is genuinely unknown. The bounty payouts may be the visible 30% of an iceberg whose bottom never surfaced.

Second, payout size correlates with program cap, not with bug severity. Polygon’s MRC20 bug threatened $22 billion and paid $2.2 million. Wormhole’s proxy bug threatened $736 million and paid $10 million. The bounty system rewards finding bugs in protocols that have already decided to pay generously. It does not equally reward finding bugs in under-funded protocols where most of the long-tail vulnerability surface lives. The economic gravity well drags researchers toward already-protected systems.

Third — and this is the structural one — bug bounties solve a coordination problem that has a clean solution (researcher meets protocol, money changes hands, code gets patched), inside a security stack where most of the unsolved coordination problems are not clean. Private key management is a problem about people, processes, and hardware in environments not under the protocol’s control. Supply chain security is a problem about transitive dependencies that no single party owns. The bounty model was built for one well-shaped problem and is being asked to do more than it was designed for.


What To Do With This

If you’re building in this space, three things follow.

Spend the bounty money anyway. Even taking all the criticism above seriously, the ROI math doesn’t break. A critical-tier program with a $1M cap is a rounding error against the cost of one exploit. Set one up. Fund it visibly. The signaling effect alone — protocols with large active programs attract fewer opportunistic hunters but more elite researchers — improves the per-dollar yield.

Spend more on the operational layer than you think. If 88% of stolen value in Q1 2025 came from private key compromise and supply chain attacks, your security budget should reflect that ratio. Hardware-signing flows, key ceremony discipline, dependency audits, build-environment isolation, signer-UI verification — these are unsexy and they catch the bugs that bounties cannot. A $2M annual budget that puts $1.5M into operational security and $500K into a bounty program is closer to the threat distribution than the inverse.

Treat bridge boundaries as your highest-risk surface. Three of the top seven all-time payouts are bridge bugs. The pattern persists in 2026: KelpDAO ($292M) and Drift ($285M) both targeted bridge or cross-protocol infrastructure. Any code where one execution environment’s asset accounting meets another’s deserves disproportionate review, formal verification, and bounty allocation. Bridges are where the largest TVL concentrations meet the most complex invariant surfaces.

The deeper lesson is one Web3 hasn’t fully absorbed yet. Bug bounties are a beautiful piece of mechanism design — a working market where incentives produce disclosure that protects billions in user funds. They are also a working market for a specific shape of problem, in a security landscape where the problem shape is changing. The next generation of high-value security work is going to be about making the operational and supply-chain layers as legible to disclosure markets as smart contracts already are. That is a much harder design problem. The bounty platforms know it; the question is who solves it first.

satya0x’s decision in February 2022 was, in retrospect, the easy version of the trade. A clean bug, a clean disclosure, a clean payout, a clean save. The decisions that will define Web3 security in the next four years are messier — when to disclose a phishing campaign in progress, how to pay a researcher who finds a vulnerable signing flow, what to do when the bug isn’t in your code but in your operations team’s calendar. The bounty model proved that incentives can produce disclosure. The next question is whether incentives can produce hygiene. The first question had a clean answer. The second one doesn’t yet.

That’s where the next $10 million decision is waiting.

Sources: The Block, 2024 (Immunefi $110M cumulative); Sherlock, 2026 (Usual $16M cap); Mitchell Amador, 2026 (94% long-running programs surface critical bugs); Immunefi Medium and Tom’s Hardware, 2021 (Polygon MRC20 disclosure); Protos, 2022 (Saurik Optimism bug); Hacken, 2025 (Q1 2025 security report, 0.4% recovery rate); Chainalysis, 2026 (2025 hack totals; Bybit Safe{Wallet} supply-chain analysis); CoinDesk, 2026 (Amador “people problem” quote); CoinLaw, 2026 (smart contract bounty statistics; OWASP Smart Contract Top 10 2026 draft); BlockEden, 2026 (Immunefi IMU token launch); Phemex, 2026 (Uniswap v4 hooks exploit landscape).

Make the operational layer as legible to disclosure as the on-chain layer.

The bounty system works because the bug, the patch, and the payout all leave receipts a third party can verify. Operational security usually has no equivalent paper trail — which is why phishing, key compromise, and supply chain attacks resist the disclosure economics that made Wormhole’s save possible. The Agent Trust Stack — Chain of Consciousness for tamper-evident provenance, the Agent Rating Protocol for signed reputation, and the Agent Trust Handshake Protocol for mutual authentication — bolts that paper trail onto the operational stack itself. Same disclosure economics, applied to the layer where the next $10 million decision is actually waiting.

pip install agent-trust-stack · npm install agent-trust-stack
See a live provenance chain →