AI Floods Bug Bounty Submissions, Straining Crypto Protocols

John NadaBy John Nada·Apr 22, 2026·4 min read
AI Floods Bug Bounty Submissions, Straining Crypto Protocols

AI is driving a surge in bogus bug bounty submissions, complicating security for crypto protocols. Teams must adapt to maintain integrity amidst this influx.

An increase in AI usage has led to a surge in bogus bug bounty submissions, creating challenges for crypto protocols in identifying legitimate threats. Bug bounties reward ethical hackers for reporting vulnerabilities, but the influx of submissions—many of which are low-quality—has strained the resources of development teams.

According to Barry Plunkett, co-CEO of Cosmos Labs, his organization has seen a staggering 900% rise in submissions, averaging 20-50 reports daily. This increase has brought both valid and invalid reports, complicating the assessment process for teams tasked with maintaining security. Kadan Stadelmann, CTO at Komodo Platform, echoed these sentiments, noting a significant rise in low-quality submissions, some attributed to AI-generated false positives.

The crypto industry has long relied on bug bounty programs to incentivize ethical hackers to identify security vulnerabilities. These programs are especially crucial given the decentralized nature of many blockchain systems, where traditional security measures may fall short. However, with the integration of AI, the landscape is shifting dramatically. While AI tools can efficiently sift through vast amounts of code to identify potential bugs, they also have a tendency to generate false positives, or “hallucinations,” which can lead to confusion and misallocation of resources.

Barry Plunkett highlighted that the surge in submissions has created a dual-edged sword situation: while there are more reports, the quality of many has significantly declined. This influx complicates the already challenging task of prioritizing legitimate threats against the backdrop of a rapidly evolving threat landscape. "AI is changing the way that bug bounty programs must operate," Plunkett stated, underlining the urgency for teams to adapt their strategies in response to these challenges.

This phenomenon is not isolated to Cosmos Labs. Kadan Stadelmann reported a notable increase in bug bounty submissions and payouts across various organizations. He noted, "There has definitely been an increase in low-quality bug bounty submissions, some of which have been false positives, potentially suggesting AI sourcing." This trend raises questions about the sustainability of current bug bounty models, especially as the cost to produce a report diminishes with the aid of AI.

Daniel Stenberg, the creator of the widely used open-source data transfer tool curl, expressed frustration over the influx of what he termed "AI slop in vulnerability reports." Stenberg's decision to end his bug bounty program highlights the growing concerns among developers that AI-generated submissions could drown out genuine vulnerabilities, leading to a situation where critical threats might be overlooked.

As the crypto community grapples with these challenges, organizations are beginning to reassess their bug bounty strategies. Plunkett mentioned that Cosmos Labs is adapting by tightening submission scoring and prioritizing researchers with proven track records. This approach not only aims to ensure that quality submissions are recognized but also fosters a more trustworthy environment for ethical hackers.

Stadelmann, on the other hand, emphasized the importance of integrating AI solutions into the bug bounty process itself. He suggested that blockchain teams should develop defensive AI systems capable of automatically filtering through incoming submissions to identify which reports merit further investigation. "The smaller the team, the bigger the problem of increased bug bounties will become," Stadelmann noted, underscoring the disproportionate impact on smaller development teams that may lack the resources to handle the volume of reports.

The necessity for stricter standards in bug bounty programs is becoming increasingly apparent. As the crypto landscape continues to evolve, the implications of AI on security protocols are profound. The reliance on AI tools for both identifying vulnerabilities and generating reports could lead to systemic issues if not managed correctly. The balance between leveraging technological advancements and ensuring the integrity of security measures will be a critical focus for organizations moving forward.

In light of these challenges, organizations are encouraged to share best practices and collaborate with other bug bounty providers to navigate the complexities introduced by AI. By fostering a community-oriented approach, teams can pool resources and insights, developing more robust strategies to combat the influx of low-quality submissions. Such collaborations could lead to the creation of new standards that help delineate between valuable contributions and those that merely add noise to the system.

The future of bug bounty programs in the crypto space hinges on the ability of organizations to adapt and innovate. As Plunkett aptly noted, the impact of AI is not a passing phase; it is reshaping how security measures are implemented and maintained. Organizations that can effectively harness AI's capabilities while mitigating its pitfalls will be better positioned to protect their protocols and foster a secure environment for users.

Scroll to load more articles