EOSE LABS · BOUNTY CRM HELIX · PROG-WH-001
WORMHOLE
CRITICAL × 9 HIGH × 6 13 ASSETS IMMUNEFI γ₁ = 14.134725141734693 Day 98
Program Overview
9
Critical Impacts
6
High Impacts
13
Assets
30+
Chains
19
Guardians
13/19
VAA Threshold

Wormhole is a cross-chain messaging protocol connecting 30+ chains via a Guardian network of 19 nodes. A VAA (Verified Action Approval) requires 13/19 guardian signatures to be valid. The protocol bridges tokens, governance messages, and arbitrary data across EVM, Solana, CosmWasm, Move, and more.

ME-COLI Layer Architecture
L1 Boundary · Guardian Network
5 CRITICAL impacts
L2 Genome · Bridge Contracts
1 CRITICAL · 4 HIGH
L3 Expression · publishMessage / parseVAA
0 CRITICAL
L4 Metabolism · Token Flow · NTT Rate Limits
3 CRITICAL · 1 HIGH
L5 Regulation · Guardian Governance · multigov
1 CRITICAL
L6 Behavior · Race Conditions · Stress Edge Cases
2 CRITICAL · 1 HIGH
L7 Population · 30+ Chains · Guardian DoS
0 CRITICAL · 2 HIGH
L8 Evolution · Guardian Set Upgrades · Future Bugs
0 CRITICAL · 1 HIGH
13 Assets
IDAsset / RepoTypeME-COLI LayerValue
WH-A01wormhole/tree/main/nodeBlockchain/DLTL1L5CRITICAL
WH-A02wormhole/tree/main/wormchainBlockchain/DLTL5HIGH
WH-A03contract-addresses (all chains)Smart ContractL1L2CRITICAL
WH-A04wormhole/tree/main/ethereumSmart ContractL2L3CRITICAL
WH-A05wormhole/tree/main/solanaSmart ContractL2L3HIGH
WH-A06wormhole/tree/main/cosmwasmSmart ContractL2L3HIGH
WH-A07wormhole/tree/main/algorandSmart ContractL2L3MEDIUM
WH-A08wormhole/tree/main/aptosSmart ContractL2L3MEDIUM
WH-A09wormhole/tree/main/suiSmart ContractL2L3MEDIUM
WH-A10wormhole/tree/main/nearSmart ContractL2L3MEDIUM
WH-A11wormhole-circle-integrationSmart ContractL4HIGH
WH-A12native-token-transfers ⭐Smart ContractL4L6CRITICAL
WH-A13multigov/ ⭐Smart ContractL5CRITICAL

⭐ Priority targets — newest code, L5+L6 empirically weakest layers

Priority Targets (ME-COLI Empirical)

Empirical finding from 10-protocol autopsy: L5 Regulation = 5 FAIL, L6 Behavior = 7 FAIL. Every DeFi audit starts at L5+L6. Wormhole's equivalents: NTT (L4+L6) and multigov (L5).

Priority 1 · WH-A12
native-token-transfers (NTT)
Newest code, least audited. Rate limiter (WH-I09), mode switching, peer registration abuse. L4+L6 surface — both empirically weak layers in DeFi.
→ WH-I09 (rate limiter bypass) · WH-I04 (token theft)
Priority 2 · WH-A13
multigov/
Cross-chain governance voting — L5 Regulation. Novel attack surface: quorum manipulation, proposal execution across chains, voting weight discrepancies.
→ WH-I06 (governance → fund loss)
Priority 3 · WH-A04
ethereum/ core bridge
Highest TVL, most battle-tested but richest payout. Transfer Verifier bypass (WP-0014), Accountant bypass (WP-0011), VAA parsing edge cases.
→ WH-I02 (Transfer Verifier) · WH-I08 (Accountant)
Critical Impacts (9)
WH-I01
Super-minority guardian attack (excluding DoS)
L1CRITICAL
WH-I02
Unrestricted bypass of Transfer Verifier (WP-0014)
L1L2CRITICAL→ WH-A04 / WH-A03
WH-I03
Race conditions — unlikely but significant impact if triggered
L6CRITICAL
WH-I04
Locking / loss / theft of user funds from Portal Token Bridge
L4CRITICAL→ WH-A04 / WH-A12
WH-I05
Forging signed messages from a super-minority of Guardians
L1CRITICAL→ WH-A01
WH-I06
Unauthorized governance param changes → direct loss of funds
L5CRITICAL→ WH-A13 / WH-A02
WH-I07
Theft of funds from exposure of production private keys of a quorum of Guardians
L1CRITICAL→ WH-A01
WH-I08
Unrestricted bypass of the Accountant (WP-0011)
L1L4CRITICAL→ WH-A04 / WH-A03
WH-I09
Unrestricted bypass of rate limiters, including the Governor module
L4L6CRITICAL⭐ WH-A12 NTT priority
High Impacts (6)
WH-I10
Future-exploitable bugs (config change or likely code change path)
L8HIGH
WH-I11
DoS against Guardian network → 24h+ degradation (non-volumetric)
L7HIGH→ WH-A01
WH-I12
VAA forgery / circumventing VAA verification (non-critical category)
L1L2HIGH
WH-I13
Attacks that are very capital-intensive but could be critical
L4HIGH
WH-I14
Attacks that would be critical if a single Guardian were malicious
L1HIGH
WH-I15
Critical/high severity requiring feasible guardian or user interaction
L6L7HIGH
Medium Impacts (6)
WH-I16
Compromising a single guardian node
L1MEDIUM
WH-I17
Cryptographic implementation flaws / RNG flaws with limited impact
L2MEDIUM
WH-I18
Compromising a single guardian node (alt scope)
L1MEDIUM
WH-I19
Forging of wormhole messages (VAAs) or circumventing VAA verification
L2MEDIUM
WH-I20
RCE vulnerability → gaining control of multiple Guardian nodes
L1MEDIUM
WH-I21
Any other vulnerabilities leading to Tier 1-3 impacts
L2L3MEDIUM
Impact Layer Heatmap
L1
11
11 impacts · 5 CRITICAL ← most valued layer in program
L2
5
5 impacts · 1 CRITICAL
L4
4
4 impacts · 3 CRITICAL ← second richest, NTT lives here
L6
3
3 impacts · 2 CRITICAL ← empirically weakest DeFi layer
L7
2
2 impacts · 0 CRITICAL
L5
1
1 impact · 1 CRITICAL ← governance, multigov lives here
L3
1
1 impact · 0 CRITICAL
L8
1
1 impact · 0 CRITICAL
Finding → Asset → Impact Routing
Finding TypeAssetImpactTier
NTT rate limiter bypassWH-A12WH-I09CRITICAL
NTT mode switch / peer registration abuseWH-A12WH-I09 or WH-I04CRITICAL
multigov quorum manipulation / governance VAA spoofWH-A13WH-I06CRITICAL
Transfer Verifier bypass (WP-0014)WH-A04 / WH-A03WH-I02CRITICAL
Accountant bypass (WP-0011)WH-A04 / WH-A03WH-I08CRITICAL
Portal Token Bridge theft / lockWH-A04WH-I04CRITICAL
Guardian key exposure (quorum)WH-A01WH-I07CRITICAL
Super-minority VAA forgeryWH-A01WH-I05CRITICAL
Race condition (state mutation)WH-A04 / WH-A12WH-I03CRITICAL
VAA replay / verification bypass (controlled)WH-A04/A05/A03WH-I12HIGH
Future-path exploit (L8 upgrade path)anyWH-I10HIGH
Guardian DoS via logic bugWH-A01WH-I11HIGH
RCE on guardian nodeWH-A01WH-I20MEDIUM
CCTP / Circle integration issueWH-A11WH-I04 or WH-I09HIGH
wormchain governance execution flawWH-A02WH-I06CRITICAL
Key Whitepapers (CRITICAL impact dependencies)
WP-0014 · CRITICAL
Transfer Verifier — bypass = WH-I02 (CRITICAL)
github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0014_transfer_verifier.md
WP-0011 · CRITICAL
Accountant — bypass = WH-I08 (CRITICAL)
github.com/wormhole-foundation/wormhole/blob/main/whitepapers/0011_accountant.md
GOVERNOR MODULE · CRITICAL
Rate Limiter / Governor — bypass = WH-I09 (CRITICAL)
github.com/wormhole-foundation/wormhole/tree/main/node/pkg/governor
Active Findings (Day 98)
Program entry created Day 98. Research scan in progress.
Priority scan order: WH-A12 (NTT) → WH-A13 (multigov) → WH-A04 (ethereum)
Start with L5+L6 failure modes per ME-COLI empirical findings.