Proof of Hack

Trustless responsible disclosure with on-chain proof and accountability. White hats hash exploit proof to Solana, protocols verify privately, both sides have cryptographic accountability.

1

Hash & Commit

SHA-256 hash your exploit proof. The commitment goes on-chain immediately — immutable, timestamped proof you found it first.

2

Encrypt & Share

NaCl box encrypt your proof with the protocol's public key. Only they can decrypt it. No middlemen, no trust required.

3

Verify & Resolve

Protocol acknowledges, fixes, and pays. If they ghost you, reveal your proof publicly after the grace period. On-chain accountability.

Who are you?

Program: 4uYHTy...WTQAn

Solana Devnet | Anchor 0.32.1 | GitHub | skill.json