Bug Bounty Program - Tectum Blockchain

Table of Contents

Share:

Bug Bounty Program

Exciting news! We are launching our SoftNote Bug Bounty program for softnote.com and it is now open to all participants. For those who discover critical exploits, the reward can be as high as $1000.

SoftNote bug bounty program aims to incentivise ethical hackers to discover and report vulnerabilities in the SoftNote and Tectum Protocol architecture. The bug bounty covers any of our products deployed on Tectum mainnet.

 

Rewards are split based on the severity of the vulnerability as follows and will be paid in TET tokens.

  • Critical (CVSS 9.0 – 10.0) up to $1000
  • High (CVSS 7.0 – 8.9) up to $700
  • Medium (CVSS 4.0 – 6.9) up to $400
  • Low (CVSS 0.0 – 3.9) up to $100

Common Vulnerability Scoring System

In Scope

https://wallet.softnote.com/

Program Rules

  • Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
  • Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
  • When duplicates occur, we only award the first report that was received
  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
  • Social engineering (e.g. phishing, vishing, smishing) is prohibited.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Disclosures

Please e-mail all submissions to [email protected] with the subject “BUG BOUNTY” or fill out the form below. Your submission should include any steps required to reproduce or exploit the vulnerability. Please allow time for the vulnerability to be fixed before discussing any findings publicly. After receiving a submission, we will contact you with expected timelines for a fix to be implemented.

The Vulnerability Disclosure Policy (Bug Bounty Program Policy) must be followed in order to qualify for Bug Bounty Rewards.

Download Bug Bounty Program Policy

Happy bug hunting!