Banner object (1)

Hack and Take the Cash !

790 bounties in database
  Back Link to program      
11/04/2018
The SAMURAI Kingdom logo
Thanks
Gift
Hall of Fame
Reward

Reward

5000 ¥ 

In Scope

Scope Type Scope Name
android_application https://play.google.com/store/apps/details?id=jp.co.pokelabo.android.gemini&hl=ja
android_application https://itunes.apple.com/jp/app/samukin-zhan-luannosamuraikingudamu/id674531108
android_application https://play.google.com/store/apps/details?id=jp.co.pokelabo.android.gemini&hl=ja
android_application https://itunes.apple.com/jp/app/samukin-zhan-luannosamuraikingudamu/id674531108
web_application play.google.com
web_application itunes.apple.com

The SAMURAI Kingdom

Rules

Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.

Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.

Scope

 The following applications are in-scope for this program.

The SAMURAI Kingdom

・Android
https://play.google.com/store/apps/details?id=jp.co.pokelabo.android.gemini&hl=ja
・iOS
https://itunes.apple.com/jp/app/samukin-zhan- luannosamuraikingudamu/id674531108

The following domain URL connect with application.
samu-rai.jp

Eligible For Bounty

 The following vulnerabilities are eligible to receive bounty reward.

(1) Remote Code Execution
(2) Billing System Bypass
(3) SQL Injection
(4) Authentication Bypass
(5) Game Cheat
(6) Cross-Site Scripting (XSS)
(7) Cross-Site Request Forgery (CSRF)
(8) Other

The following guidelines the bounty amount for in-scope vulnerabilities.
Please note that reward amounts may vary depending on the severity of the vulnerability reported.

(1) ¥300,000 Remote Code Execution
(2) ¥200,000 Billing System Bypass
(3) ¥200,000 SQL Injection
(4) ¥100,000 Authentication Bypass
(5) ¥50,000 - ¥5,000 Game Cheat
(6) ¥50,000 Cross-Site Scripting (XSS)
(7) ¥10,000 Cross-Site Request Forgery (CSRF)
(8) ¥5,000 Other

Not Eligible For Bounty

 Reports related to the following issues are out-of-scope for this program.

(1) Vulnerabilities found through automated scans or tools
(2) Hypothetical or theoretical vulnerabilities without actual verification code
(3) Vulnerabilities with capability of Denial of Service attack
(4) Vulnerabilities with capability of brute force against password or tokens
(5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
(6) Login/Logout CSRF
(7) Missing CSRF tokens
(8) CSRF on forms that are available to anonymous users (e.g. contact form)
(9) Missing security headers
(10) Vulnerabilities found in domains out-of-scope
(11) Vulnerabilities affecting outdated browsers or platforms
(12) Presence of autocomplete attribute on web forms
(13) Missing secure flags on non-sensitive cookies
(14) Reports of insecure SSL/TLS ciphers
(15) Vulnerabilities with capability of username/email enumeration
(16) Descriptive error messages (e.g. Stack traces, application or server errors)
(17) Banner disclosure on servers
(18) Misconfiguration of SPF record, DMARC and DKIM
(19) Invalid HTTP method

Notes

For eligibility details, please refer to the "Terms of Service Article 4" of this site.

FireBounty © 2015-2019

Legal notices