52235 policies in database
Link to program      
2016-10-31
2020-04-07
Blockchain logo
Thank
Gift
HOF
Reward

Reward

50 $ 

Blockchain

Intro

Blockchain.com is the most trusted and fastest-growing crypto company, helping millions across the globe have an easy and safe way to access cryptocurrencies.

To date, we have over 80 million wallet signups, 1 trillion cryptocurrency and token transactions, and 37 million verified users supporting 200+ countries.

If you are new to our products, please review our Security Learning Portal before submitting reports.

Terms

  • You are welcome to test our products with your own funds but please note that Blockchain.com is not responsible for any losses.

  • Our evaluation of all reported vulnerabilities is final.

Response Targets

Blockchain.com will make a best effort to meet the following response targets for hackers participating in our program:

  • Time to first response (from report submit) - 2 business days

  • Time to triage (from report submit) - 5 business days

  • Time to bounty (from triage) - 10 business days

  • Time to resolution - depends on severity and complexity

| Severity | SLA in business days |

| ------------- | --------------------- |

| Critical | 2 days |

| High | 7 days |

| Medium | 60 days |

| Low | 180 days |

We’ll try to keep you informed about our progress throughout the process.

Disclosure Policy

  • Do not discuss any vulnerabilities (even resolved ones) outside of the program without express consent from Blockchain.com.

  • Follow HackerOne's disclosure guidelines.

Program Rules

  • Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.

  • Please do NOT use automatic scanners. We cannot accept any submissions found by using automatic scanners.

  • Rate limit (maximum amount of requests per second) used in automation: max 3 requests per second.

  • Submit one vulnerability per report, unless you need to chain vulnerabilities to maximise impact.

  • When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced). Issues identified by our internal security testing prior to your report count as duplicates.

  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.

  • Social engineering of any type (e.g. phishing, vishing, smishing) is strictly prohibited.

  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with the explicit permission of the account holder.

  • The scope approximately lists assets in scope for bounty testing including wildcards, except where otherwise excepted. We exercise sole and final discretion on which assets are in scope.

Out of Scope

When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) the security impact of the bug. The following issues are considered out of scope:

  • Open redirect at blockchain.com/r unless you devise a way to bypass the warning screen

  • The same email address can be used to register multiple wallet accounts -- this is intentional.

  • https://en.bitcoin.it/wiki/ and the en.bitcoin.it domain are NOT owned by Blockchain.com and therefore are NOT in scope.

  • Support for HTTP methods such as OPTIONS does not constitute a vulnerability by itself; please ONLY submit findings related to this if you identify specific vulnerabilities.

  • Clickjacking on pages with no sensitive actions.

  • Password, email, and account policies, such as email address verification, password complexity.

  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions

  • Rate limiting or brute-force issues on non-authentication endpoints

  • Missing flags like HttpOnly or Secure on cookies

  • Missing best practices in Content Security Policy or best practice security headers

  • Presence of autocomplete attribute on web forms

  • Tabnabbing or Reverse tabnabbing

  • Blind SSRF without proven business impact (DNS pingback only is not sufficient)

  • Open redirect - unless an additional security impact can be demonstrated

  • Missing email best practices (Invalid, incomplete, or missing SPF/DKIM/DMARC records, etc.)

  • Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors).

  • Attacks requiring MITM or physical access to a user's device.

  • Previously known vulnerable libraries without a working Proof of Concept.

  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.

  • Missing best practices in SSL/TLS configuration.

  • Any activity that could lead to the disruption of our service (DoS).

  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS

  • Phishing websites and malware lookalike applications (please report to Support staff instead)

  • Physical security of our offices, employees, etc.

  • Non-security-impacting UX issues

Web applications operated by third parties are only considered in scope under the following ways:

  • Aspects which we directly control such as our own DNS records for subdomains that point to third party applications are in scope.

  • Vulnerabilities in third-party applications must first be reported to the vendor. We may optionally reward these issues on top of the vendor based on the outcome of that report.

The following assets represent third-party applications, along with their vendors to report issues to:

  • email-clicks.blockchain.com (SendGrid)

  • support.blockchain.com (ZenDesk)

  • blog.blockchain.com (Medium)

  • why.blockchain.com (InstaPage)

  • track.blockchain.com (Tune)

  • partners.blockchain.com (Tune)

Testing Tips

When spidering or testing our blockchain data, our site contains many URL variations exposing the data with few variations that merit individual security testing. This includes:

Our open source application source code can be found for review at GitHub.

Safe Harbor

Any activities conducted in a manner consistent with the law and our bounty policy will be considered authorised conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

Thank you for helping keep Blockchain.com and our users safe!

In Scope

Scope Type Scope Name
android_application

piuk.blockchain.android

android_application

com.blockchain.exchange

ios_application

493253309

ios_application

1557515848

web_application

ws.blockchain.info

web_application

*.blockchain.com

web_application

api.blockchain.info

web_application

www.blockchain.info

Out of Scope

Scope Type Scope Name
web_application

blog.blockchain.com

web_application

support.blockchain.com

web_application

email-clicks.blockchain.com

web_application

track.blockchain.com

web_application

partners.blockchain.com

web_application

why.blockchain.com


This program have been found on Hackerone on 2016-10-31.

FireBounty © 2015-2024

Legal notices | Privacy policy