Banner object (1)

Hack and Take the Cash !

790 bounties in database
  Back Link to program      
21/02/2018
Electroneum logo
Thanks
Gift
Hall of Fame
Reward

Reward

50 $ 

In Scope

Scope Type Scope Name
web_application api.electroneum.com
web_application my.electroneum.com

Out of Scope

Scope Type Scope Name
web_application *.electroneum.com

Electroneum

Electroneum looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe.

Latest Software Rollouts

  • 13th May 2019 - Improved registration process rolled out

  • 11th April 2019 - Resolved the following Issues -
    Enumerating existing registered emails by using the error page,
    Secure the vendor delete outlet URL,
    Non-expiring PIN reset token,
    CSRF attack allowing Language change

  • 22nd February 2019 - Improvements and bug fixes - Removal of Instant Payments Time Limit (no longer 1 transaction every 5 minutes)

  • 18th February 2019 - Additional bug fixes

  • 23rd January 2019 - Updates for cloud mining and general bug fixes

  • 8th November 2018 - Dashboard Updates for KYC

SLA

Electroneum will make a best effort to meet the following SLAs for hackers participating in our program:

  • Time to first response (from report submit) - 5 business days
  • Time to triage (from report submit) - 10 business days
  • Time to bounty (from triage) - 10 business days

We’ll try to keep you informed about our progress throughout the process.

Disclosure Policy

Program Rules

  • Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
  • Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
  • When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).
  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
  • Social engineering (e.g. phishing, vishing, smishing) is prohibited.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Rewards

Our rewards, (see bounty table above) are based on severity per CVSS (the Common Vulnerability Scoring Standard). Please note these are general guidelines, and that reward decisions are up to the discretion of Electroneum.

Examples of vulnerabilities

Critical - Identifying a vulnerability that allows you to obtain/spend another users Electroneum.
High - Identifying a vulnerability that allows you to expose another user’s data.

Out of scope vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:

  • Vulnerabilities associated with creating an emulator for the mining environment that do not demonstrate the ability to dramatically increase mining function or show other security impact Clickjacking on pages with no sensitive actions.
  • Unauthenticated/logout/login CSRF.
  • Attacks requiring MITM or physical access to a user's device.
  • Previously known vulnerable libraries without a working Proof of Concept.
  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.
  • Missing best practices in SSL/TLS configuration.
  • Any activity that could lead to the disruption of our service (DoS).
  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
  • Password complexity-related issues

Thank you for helping keep Electroneum and our users safe!

Electroneum believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Public Program

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Exclusions

While researching, we'd like to ask you to refrain from:

  • Denial of service
  • Spamming
  • Social engineering (including phishing) of Electroneum staff or contractors
  • Any physical attempts against Electroneum property or data centers

Joining the Electroneum Public Bounty Program

Please ensure you are registered with HackerOne to ensure you can be rewarded for responsibly disclosing any potential security issue.

Thank you for helping keep Electroneum and our users safe!

FireBounty © 2015-2019

Legal notices