Protocols
Protected
Over the past year, more than $2 billion was lost to crypto hacks. The Safe Harbor initiative seeks to reduce these losses by enabling whitehats to protect vulnerable funds. By joining, protocols can set up clear asset recovery procedures, including recovery addresses and bounty terms. This initiative provides legal protection for whitehats, allowing them to secure at-risk assets without fear of legal consequences. Ultimately, it offers protocols enhanced security from third-party whitehats at no additional cost.
The Safe Harbor initiative functions similarly to a bug bounty program but focuses on active exploits—situations where a vulnerability is currently being exploited by a malicious actor. By pre-establishing a framework for responding to active exploits, whitehats will have clarity on how to act and will be more likely to intervene.
Protocols evaluate the Safe Harbor agreement and decide on key terms, such as in-scope assets and reward structures.
For DAOs, a governance proposal is created and voted on to adopt the Safe Harbor agreement.
Include the agreement in the protocol’s website terms of service and execute an on-chain governance transaction to formalize the adoption.
View the protocols that have already signed up and learn about their agreements.
View Safe Harbor databaseUse our onboarding pipeline to sign up for Skylock Firewall and the Safe Harbor Agreement
Adopt Safe Harbor NowFor a comprehensive guide on adopting the Safe Harbor initiative, refer to our detailed written guide