Bug Bounty Program

The safety of our users’ funds and personal data is our main priority, therefore, the security of our platform and services is the field we work on daily and implement a number of advanced security technologies. Nevertheless, the contribution of the security researchers, who assist us in keeping our products and users safe, is extremely important for us, that is why we launched a vulnerability detection bounty program. The terms and conditions of our bug bounty program are described in this Bug Bounty Policy.


Ineligibility


Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:


WEB:



MOBILE:



Reward


There is no limit on the maximum and minimum reward size, we reserve the right to increase or decrease the size of the reward depending on the seriousness of the vulnerability found. Researchers are more likely to receive increased rewards if they can demonstrate how the found vulnerability may be used to cause the most harm.

1. Remote code execution: $10,000

2. Manipulating user balances: $10,000

3. XSS/CSRF/Clickjacking affecting user balances/trading/exchange/deposits: $2,000

4. Theft of information related to passwords/API keys/personal information: $2,000

5. Partial authentication bypass: $1,500

6. Other vulnerability with clear potential for financial or data loss: $500

7. Other CSRF (excluding logout CSRF): $500


Rules and Guidelines to Report the Vulnerabilities and Get the Reward


Taking into account the illegal nature of unauthorized access to the computer systems, we agree not to take legal action against the researchers nor ask law enforcement bodies to investigate the cases of the security breach by the researchers in case they comply with the industry standards and responsible disclosure guidelines described in this section.

1. Main points to receive a reward for detecting vulnerabilities:

2. You must be the first to report a vulnerability to receive a reward.

3. In case you find chain vulnerabilities we pay only for vulnerability with the highest severity.

4. You should send a clear textual description of the work done, along with steps to reproduce the vulnerability.

5. Responsible disclosure guidelines:

Do not violate any law and stay in the defined scope, and do not participate in any illegal actions (activities).

After sending a report, you cannot tell anyone or anywhere about the vulnerability. Public disclosure of a vulnerability makes it ineligible for a reward. Furthermore, you shall not store screenshots and/or executable codes and scripts related to the vulnerability not to make the information available to third parties.


Non-security Issues


You may let us know about non-security issues at [email protected]