One question: could the bounty refund be exploitable. For example could someone set up the job in a way to search for decoy results, while getting his desired results without paying the bounty?
I don't think so, because:
1.) The POW work packages are absolutely useless for the job author. They hash the current state, the last block's hash, the input variables and some other stuff that the author cannot use for anything useful.
2.) This leaves only the bounties. What the job author indeed could do is to push a "bounty check function" that never evaluates to TRUE so no bounty is found at all. But in this case, nothing will be transmitted by the "miners" except those useless POW from pt.1. This also means, that the attacker does not profit in any form from what is calculated on the users computers - it just stays there and never leaves it unless the bounty check function evaluates to TRUE.
3.) A useless "bounty check function" will cost the job author money - the funds in the POW fund. So there is no incentive to do that "just for fun".