YESWEHACK CONNECTS YOU WITH A COMMUNITY OF EXPERTS TO MEET YOUR SECURITY NEEDS
We believe that no technology is perfect and that working with skilled security researchers is crucial in identifying weaknesses in our technology.
If you believe you've found a security bug in our service, we are happy to work with you to resolve the issue promptly and ensure you are fairly rewarded for your discovery.
Any type of denial of service attacks is strictly forbidden, as well as any interference with network equipment and yeswehack.com infrastructure.
We are happy to thank everyone who submits valid reports which help us improve the security of yeswehack.com however, only those that meet the following eligibility requirements may receive a monetary reward:
We are open to some types of reports related to exposed secrets, credentials or information.
Please pay attention to our list of Qualifying/Non-Qualifying vulnerabilities, as well as our Scope and the following rules.
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behavior (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers.
Reports of exposed secrets, credentials and sensitive information will be considered eligible if it complies with the following:
The source of exposure/leak is under YesWeHack's control, directly or indirectly.
e.g. stolen information or bundled information from a random source is not eligible.
The exposed information has been verified (or tested) and confirmed
If you identify a source (under our control) that is leaking multiple data, we kindly ask you to report it in a single report and we will consider the impact based on the nature and depth of the exposed data.
To summarize our policy, you may refer to this table :
Type of leak | Source of leak is in-scope | Source of leak belongs to YesWeHack but is out-of-scope | Source of leak does not belong to YesWeHack and is out-of-scope |
---|---|---|---|
Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible ✅ | Eligible ✅ | Not eligible ❌ |
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible ✅ | Eligible ✅ | Not eligible ❌ |
As a complement to the Program’s rules and testing policy :
Any issues with Wallet or KYC features (Third party services)
Scope Type | Scope Name |
---|---|
api | https://api.yeswehack.com |
api | https://apps.yeswehack.com |
web_application | https://yeswehack.com |
Scope Type | Scope Name |
---|---|
undefined | Vulnerabilities reported on other services or applications are not allowed. |
undefined | Any issues with Wallet or KYC features (There are third party services) |
This program crawled on the 2019-01-15 is sorted as bounty.
FireBounty © 2015-2024