RedTeam
SN61Competitive cybersecurity challenges where hackers and defenders compete to find exploits
Decentralized cybersecurity through competitive programming. Miners develop and submit code solutions to security challenges designed to enhance real-world product security. The best solutions are integrated into actual products, turning competitive hacking into productive defense.
// Hackers competing to secure the internet.
RedTeam is a subnet by Innerworks where miners compete to solve cybersecurity challenges through code. Unlike traditional bug bounties (which find vulnerabilities), RedTeam focuses on building security solutions: code that can be directly integrated into products to make them more secure.
The simple version: Imagine a hacking competition where instead of breaking things, participants compete to build the best security tools. The winning tools get integrated into real products. RedTeam turns the adversarial energy of cybersecurity into constructive output.
Centralized equivalent: Think HackerOne or Bugcrowd combined with competitive programming platforms like Codeforces, but focused on producing deployable security code rather than just finding bugs.
How it works:
- Miners develop and submit code solutions to various technical security challenges. Solutions must be practical enough to integrate into real-world products.
- Validators evaluate code submissions for correctness, security effectiveness, and quality. Challenges are designed to drive innovation in specific security domains.
- The problem it solves: Cybersecurity talent is scarce and expensive. Companies struggle to find skilled security engineers, and bug bounties only find problems without fixing them.
- The opportunity: Global cybersecurity spending exceeds $200 billion annually. Automated security code generation that actually works is enormously valuable.
- The Bittensor advantage: 39 contributors (the highest contributor count in our entire coverage) means diverse security expertise. Different perspectives catch different vulnerabilities.
- Traction signals: 1,362 commits across 39 contributors (most diverse team in our coverage). B. Batkhuu leading development. 57 active miners. Dev activity score: 8.2/10. 90-day return of +28%.
Category: Cybersecurity | Centralized Competitor: HackerOne, Bugcrowd, Snyk, Veracode, CrowdStrike
RedTeam's contributor diversity is its standout metric: 39 contributors is the highest in our entire coverage. In cybersecurity, diverse perspectives are directly valuable because different security backgrounds catch different types of vulnerabilities.
Mechanism:
The competitive programming format is well-suited to security. Security challenges have clear success criteria (does the code prevent the attack?), and code quality can be objectively measured. The pipeline from "competitive challenge solution" to "integrated product feature" creates a direct path from subnet activity to real-world value.
The codebase has 1,362 commits with steady activity of 2-9 commits per week. The recent focus on dependency updates and changelog management suggests a maturing project with good engineering practices.
Market metrics show a smaller but active subnet. At 21,262 TAO market cap with 1,627 holders, RedTeam is mid-tier. Gini of 0.699 and root proportion of 0.167 are healthy. The 90-day return of +28% shows positive momentum despite the -16% 7-day pullback.
The -727 TAO net 7-day outflow is the largest in this batch and worth watching.
- Large 7-day outflow: -727 TAO net outflow is significant relative to market cap.
- Challenge design: The quality of the subnet depends on the quality of security challenges. Poorly designed challenges could reward superficial solutions.
- Integration gap: Producing good security code in a competition is different from integrating it into production systems.
- Short-term volatility: -16% in 7 days despite positive 90-day trend suggests uncertainty.