I SAVED $500M

|
SCROLL FOR THE TRUTH

WHO IS F4LC0N?

A security researcher. A bug hunter. Someone who protects protocols — not exploits them.

🏆 #1 Attackathon Stacks
🏆 #2 Attackathon Stacks II
🏆 #1 Attackathon XRPL Lending
🐛 Critical + High Bug Bounties

THE CRITICAL VULNERABILITY

Any user could directly drain any account on the Injective chain.

No special permissions needed.

$ 0

IN ON-CHAIN ASSETS WERE AT RISK

TIMELINE OF EVENTS

Vulnerability Discovered

F4LC0N identifies a critical vulnerability in Injective Protocol capable of draining any account.

Reported Through Immunefi

The bug is responsibly disclosed through the proper channel — Immunefi's bug bounty platform.

Mainnet Upgrade Rushed

The very next day, Injective pushes a mainnet upgrade to governance vote. They understood the severity.

3 Months of Silence

No follow up. No technical discussion. No communication. Nothing. Complete radio silence.

Lowball Offer: $50K

After 3 months, Injective offers $50K for a Critical vulnerability — their own program's max payout is $500K. No explanation given.

Dispute Filed

F4LC0N disputes the decision. Silence again. No conversation at all.

Still Unpaid

To be clear: even the $50K has not been paid. Zero dollars for saving $500 million.

THE MATH

ASSETS SAVED $500,000,000
vs
BOUNTY OFFERED $50,000

That's 0.01% of what was saved.

Their own program's maximum for Critical is $500,000.

AND THEY DIDN'T EVEN PAY THE $50K

$0 paid. Zero. Nothing. Not a single dollar.

THE PLEDGE

"I will dedicate 10% of all my future bug bounty earnings to making sure this story stays visible — until Injective pays what I deserve."

— f4lc0n

WE WANT

JUSTICE