The security of our products is very important to us, and we constantly strive to guarantee our users' security. The Binary.com Security team hopes to raise the comprehensive security of our products by working closely with individuals, organisations, and companies. To protect the interests of our users, we thank and reward researchers who help us improve our security.
Respect our users’ privacy. We oppose and condemn the actions of hackers who use vulnerability testing as an excuse, for example:
exploiting vulnerabilities to steal user data
intrusion into Binary’s services
changing, copying, or stealing data from related system services
Do not cause more harm than good. You should never leave a system or users in a more vulnerable state than when you found them. You should not engage in testing or related activities that degrade, damage, or destroy information within our systems or that may impact our users, such as denial of service, social engineering, or spam.
When the results of the vulnerability review are disputed, we will handle the disputes according to the principle of prioritising the reporters’ interests, and, if necessary, external parties may be invited to decide and introduce the Common Vulnerability Scoring System (CVSS) standard jointly.
We will make our best effort to meet the following response targets for hackers participating in our program:
Time to first response (from report submission): 1 business day
Time to triage (from report submission): 3 business days
Time to bounty (from triage): 7 business days
We will keep you informed throughout the process.
Do not discuss this program or any vulnerabilities (even resolved ones) outside the program without consent from Binary.com.
Follow HackerOne's disclosure guidelines. If you believe you have discovered a security vulnerability, please report it with a thorough explanation of the vulnerability in compliance with our bug bounty guidelines.
Please provide detailed reports with reproducible steps. If the report is not precise enough to reproduce the issue, the issue will not be eligible for a reward.
Unverified vulnerabilities reports using automated tools or scanners will be closed as N/A or spam.
The final assessment of each vulnerability is determined by the impact, risk, and current mitigation measures. We reserve sole discretion on final assessment decisions.
If one vulnerability source causes several vulnerabilities, we will consider it as one vulnerability. For example, multiple problems caused by a certain server configuration, the same file or template, generic domain name resolution, and the like will be considered as one vulnerability.
In the event of duplicate submissions, we will only award the first report received (provided that it can be fully reproduced).
Regarding any 0-day vulnerabilities, we will only accept the report if it has been > 30 days since the relevant patch release.
Vulnerabilities regarding information disclosure of cloud storage buckets (e.g., S3, KSS, FDS, and the like):
We will confirm internally whether the information or link should be publicly accessible/viewable.
Confirmation of the valid vulnerability will be based on the sensitivity of information leakage and is at our sole discretion.
The decision to grant a reward for a vulnerability report and the value of the reward is entirely within our discretion. We will reward based on the impact and severity of the reported vulnerability. Please note that web and mobile application vulnerabilities of low severity will be triaged, but not awarded with a bounty (except in cases where the impact is severe enough to be eligible for a reward).
cashier.binary.com
crypto-cashier.binary.com
binary.com
Websocket API on binary.com (*.binaryws.com)
webtrader.binary.com
binary.bot
secure-dfadmin.binary.com
MetaTrader 5 (only functions handled by Binary.com)
github.com/binary-com
tradingview.binary.com
charts.binary.com
Tick Trade mobile app
*.binary.com (excluding any Binary.com subdomains not mentioned above)
Some operation and maintenance monitoring, test pages, test environments, and open source systems that lack access permissions
The list above is not exhaustive. We’ll update it according to business changes from time to time.
| Business type | Bounty |
|--------------------|---------------|
| Important business | Up to $10,000 |
| General business | Up to $5,000 |
| Edge business | Up to $2,500 |
Examples of CRITICAL Vulnerabilities in WEB
The ability to obtain sensitive user data and system permissions directly via command injection, order traversal, remote overflows, SQL injection, and the like
Payment vulnerabilities that could potentially lead to a critical logic error, causing loss to the company and our clients
The ability to exploit account-related vulnerabilities to obtain user details, bypass authentication, and the like
Examples of CRITICAL Vulnerabilities in MOBILE
Severe logic vulnerabilities that could cause losses to our clients
Remote command execution
The ability to access and extract users’ data
| Business type | Bounty |
|--------------------|--------------|
| Important business | Up to $5,000 |
| General business | Up to $2,500 |
| Edge business | Up to $1,000 |
Examples of HIGH Vulnerabilities for WEB
Accessing read-only back-end code and manipulate our systems
Accessing internal session cookies and other sensitive information
Bypassing verification (OTP, 2FA), log in to client accounts, extract clients’ sensitive data, and perform actions without consent
Causing damage to critical functions via privilege escalation (horizontal and vertical)
Obtaining sensitive intranet information via server-side request forgery (SSRF)
Manipulating trade contracts to earn profit
Examples of HIGH Vulnerabilities for MOBILE
Bypassing the lock screen (where applicable)
Exploiting interactive logic issues that can cause loss to clients
Gaining remote access to clients’ sensitive information
Installing malicious apps on clients’ devices, gain access to their accounts, and perform actions without their consent
| Business type | Bounty |
|--------------------|------------|
| Important business | Up to $500 |
| General business | Up to $250 |
| Edge business | Up to $100 |
Examples of MEDIUM Vulnerabilities for WEB
The ability to access a limited portion of:
client’s sensitive information
our back-end code
internal information on GitHub
Attacks via:
cross-site and server-side request forgery (without access to our internal network)
directory traversals
privilege escalation (causing damage to functional properties of our systems)
reflected and stored cross-site scripting with minimum impact (including unauthorised file uploads on our servers to enable phishing)
social engineering attempts (that prompt the user to perform unusual actions on our platforms)
subdomain takeovers
Examples of MEDIUM Vulnerabilities for MOBILE
The ability to exploit interface logic vulnerabilities to deceive our clients or to enable phishing
Attacks via SQL injection with the ability to access sensitive information in local applications
We will triage reports of low-severity vulnerabilities, and you will receive reputation points, but we will not reward them unless the impact is severe enough.
Examples of LOW Vulnerabilities for WEB
Attacks via:
cross-site request forgery (non-critical)
‘HTTP Host Header’ cross-site scripting
mail/SMS bombing
The ability to access:
non-sensitive information on third-party platforms like GitHub
non-sensitive .svn or .git files
phpinfo()
temporary files and debug information
Examples of LOW Vulnerabilities for MOBILE
The ability to:
access low-risk back-end information
exploit vulnerable app configurations
exploit vulnerabilities in complex, unusual conditions
hijack app upgrades
load URLs arbitrarily through a component that’s exposed to phishing
obtain clients’ data via social engineering
obtain non-sensitive information from local apps via SQLite injection
When reporting vulnerabilities, please consider the attack scenario/exploitability and the security impact of the bug.
The following issues are considered out of scope and will be closed as N/A:
Design flaws and best practices that do not lead to security vulnerabilities
Vulnerabilities that are no threat to Binary.com or other users, for example, self XSS, having a user paste - JavaScript into the browser console etc.
Exposure of third-party API keys with no significant security impact
Theoretical vulnerabilities without a working proof of concept (PoC)
Theoretical subdomain takeovers
Minimal security implications such as low impact CSRF (login/logout), low-impact UI redressing, misconfiguration that lead to CORS bypass but without any sensitive information leak
Content spoofing/text injection that cannot be leveraged for XSS or sensitive data disclosure
Session not invalidated after logout
Insensitive disclosure of information such as error message, software version disclosure, IP address disclosure, etc.
Arbitrary file upload without any impact
Vulnerabilities that can only be reproduced by some low-level IE browsers
HTTP codes/pages, other HTTP non- codes/pages, or etc/insensitive information files
Public links, such as social media profile pictures, live videos, etc.
Reflected file download attacks
SSRF vulnerability that does not expose intranet server information (only DNS request without any impact)
Issues related to payment providers such as skrill.com, paypal.com etc.
Misconfigurations such as:
DNS issues (e.g., MX records, SPF records, etc.)
Reports of insecure SSL/TLS cyphers (unless you have a working proof of concept and not just a report from a scanner)
Presence of autocomplete attribute on web forms
Mixed content warnings
Missing security-related HTTP headers that do not directly lead to a vulnerability
Absence of certificate pinning
Sensitive data in URLs/request bodies when protected by TLS
Unencrypted user data stored on external storage (except for APP logs with sensitive information or user data for which encryption has been promised)
Lack of obfuscation
OAuth and app secrets that are hard-coded/recoverable in APK without proven impact
Any kind of sensitive data protected by the app’s private directory
App setting allowBackup: true
Local DoS attacks with limited impact
Malformed intents sent to exported components that only causes the app to crash
Any data leak because a malicious app has acquired the appropriate permissions
Runtime hacking exploits using tools like, but not limited to, Frida and Appmon
Exploits that are only possible in a jailbroken environment
Spoofing vulnerabilities
Attacks that are only available in lower versions of Android (< 6)
Any activities conducted in a manner consistent with this policy will be considered authorised conduct, and we will not initiate legal action against you. If a third party initiates legal action against you in connection with activities conducted under this policy, we will make it known that your actions have complied with this policy.
For any questions, please contact us at security@binary.com. Thanks for keeping our business and our customers secure!
Scope Type | Scope Name |
---|---|
web_application | *.binary.com |
web_application | cashier.binary.com |
web_application | crypto-cashier.binary.com |
web_application | secure-dfadmin.binary.com |
web_application | *.binaryws.com |
web_application | webtrader.binary.com |
web_application | binary.bot |
web_application | tradingview.binary.com |
web_application | charts.binary.com |
web_application | github.com/binary-com |
web_application | com.binary.ticktrade |
web_application | app.deriv.com |
web_application | *.deriv.com |
web_application | smarttrader.deriv.com |
web_application | cashier.deriv.com |
web_application | *.deriv.cloud |
Scope Type | Scope Name |
---|---|
web_application | js.binary.com |
web_application | record.binary.com |
web_application | media.binary.com |
web_application | xml.binary.com |
web_application | login.binary.com |
web_application | admin.binary.com |
web_application | .binary. |
This program have been found on Hackerone on 2015-11-04.
FireBounty © 2015-2024