Security Experts

PolySwarm is the first decentralized marketplace where security experts earn income by operating cutting-edge micro-engines that compete to protect users and enterprises.

Problems Solved by PolySwarm

Unbalanced Market

While the costs associated with cybercrime are expected to double in 2021, experts estimate that there will be a shortage of 3.5 million IT security jobs by 2021…Most of the security jobs are in western countries, while there is lack of opportunities in other locations.

Access to opportunities

PolySwarm’s decentralized marketplace breaks down geographical barriers connecting expertise with opportunity. PolySwarm addresses the problem on both ends, allowing talented security expertise to freely flow from regions without enough jobs to regions without enough talent.

Niche software is hard to scale

It is hard to find buyers for narrowly-scoped, specialized security software solutions that security experts currently develop and use in their local threat analysis environments.

Revenue stream

Polyswarm provides security experts an outlet to monetize their already built specialized anti-malware software. They can also build their own with using PolySwarm’s platform development kit (Perigord). Experts compete to detect today’s threats and are rewarded based on accuracy and speed of their assertions.

Learn How PolySwarm Works for You

Click to go back

Option 1

Choose a reputable Ambassador

Identify a good Ambassador using PoySwarm's public, blockchain-based record of their past performance.

Simply choose a reputable Ambassador and pay their subscription fee. That’s it. You’ll now be protected by security experts worldwide.

Click to go back

Option 2

Do it yourself

There are 2 ways to submit a suspicious Artifact:
Bounties and Offers.

Click on BOUNTY or OFFER to continue

Submit a Bounty

Bounties represent a public, smart (as in contract) commitment to pay for information leading to the quarantine or exoneration of Artifacts, similar to a Wild West style “Wanted” poster.
  1. Pay a small listing fee (in Nectar) to place a Bounty.
  2. Upload the Artifact in question along with a reward of Nectar and a deadline.
  3. Experts weigh in on whether they think the Artifact is malicious.

Submit a Offer

If you want more rapid transactions and want to limit the exposure of the Artifact in question and/or prefer to work only with specific Experts, you can submit Direct Offers.
  1. Issue a direct Offer along with the Artifact to selected Experts.
  2. Each Expert decides whether to accept the direct Offer based on their confidence in rendering an accurate Assertion.
  3. Experts who accept will submit their Assertion.
Click to go back

Recruit Enterprises

Ambassadors provide a link between Enterprises and PolySwarm.

Continue collecting subscription fees on the frontend while transparently enhancing your offering by plugging into PolySwarm on the backend.

Click on BOUNTY or OFFER to continue

Submit a Bounty

Bounties represent a public, smart (as in contract) commitment to pay for information leading to the quarantine or exoneration of Artifacts, similar to a Wild West style “Wanted” poster.

  1. Pay a small listing fee (in Nectar)
    to place a Bounty.
  2. Upload the Artifact in question along with a reward of Nectar and a deadline.
  3. Experts weigh in on whether they think the Artifact is malicious.
  4. Taking the Experts’ assertions into account, you deliver a Verdict.

Submit a Offer

Offers enable rapid (and, optionally, confidential) triage of suspect artifacts with designated Experts via Raiden-style Channels. Offers are an alternative to Bounties, providing increased speed and throughput at increased Nectar and startup costs.

Click to go back

Put your knowledge to work

Get rewarded for accurate and timely threat detection.

Hunt alongside and compete with a global cadre of security experts.
  1. Create one or more Workers—modules that have codified expertise on detecting a specific type of threat in a specific type of Artifact and encapsulate your expertise.
  2. Wire the Worker up to PolySwarm by describing what types of Artifacts the Worker handles.
  3. Accept and respond to Offers and Bounties, respectively.

Click on BOUNTY or OFFER to continue

Respond to Bounties

  1. Find a Bounty that suits your expertise and meets your financial interests.
  2. Analyze the Bounty Artifact in question and author an Assertion stating whether it’s Malicious or Benign.
  3. Submit the Assertion + Assertion Fee + Assertion Bid; the latter is reflective of your Assertion confidence.
  4. Based on your Assertion and the Assertions of other PolySwarm experts, the party that placed the Bounty will arrive at a Verdict.
  5. After the Assertion Window closes, Arbiters determine the Ground Truth of the Artifact. This ground truth is fed into the Bounty smart contract, causing the contract to release "escrow of Assertion Bids" from incorrect asserters to correct asserters, in proportion to their bid amounts.
  6. With Ground Truth ingested and Bids distributed, the Bounty contract Self Destructs.

Accept Offers

  1. Enterprises and Ambassadors can choose to work with specific Experts by opening an offer channel. If you receive an Offer you can decide whether or not to participate at the amount of Nectar offered.
  2. Ambassadors rapidly reward experts in a low-friction manner using Raiden-style Channels.

Free Nectar for Malware Bounty Program.

$300,000 worth of NCT up for grabs. Enter the bounty to claim your share.

PolySwarm’s free nectar for malware campaign was launched January 23, 2018 and continues until the funding cap is reached.

We will cap the value of the campaign at $300,000 with a maximum of $6,250 to be awarded each day.

Security Experts can earn NCT while testing out the marketplace on the testnet. Once per day, each Security Expert can enter one IPFS link to a suspicious file. If you are one of the first five to trigger a ClamAV signature per malware family, you earn NCT. Each day, we will announce a specific malware family in the PolySwarm Telegram Channel, and if the user submits a file that triggers a ClamAV signature for that malware family, they will get an additional NCT bonus.

Join the Bounty Program
View Malware Bounty Program Rules for full details

A single vendor, comprised of a centralized group of threat experts, provides a “one-size-fits-all” solution. This leaves you vulnerable to attacks.

the old way

A single vendor, comprised of a centralized group of threat experts, provides a “one-size-fits-all” solution. This leaves you vulnerable to attacks.

swarm it

Micro-engines developed by a global community of security experts converge to quickly analyze the threat, providing broader analysis and protection that’s tailor-made to your exact needs.

Micro-engines developed by a global community of security experts converge to quickly analyze the threat, providing broader analysis and protection that’s tailor-made to your exact needs.

Sign up and get notified about our releases.

PolySwarm Newsletters
We never sell or share your information.