Bug Bounty Program (On Hold) - Tectum Blockchain

Bug Bounty Program

Exciting news! We are launching our SoftNote Bug Bounty program for softnote.com and it is now open to all participants. Those who discover critical exploits will receive rewards as high as $1000.

SoftNote bug bounty program incentivizes ethical hackers to discover and report vulnerabilities in the SoftNote and Tectum Protocol architecture. The bug bounty covers any of our products deployed on the Tectum mainnet.

Rewards are split based on the severity of the vulnerability as follows and will be paid in TET tokens:


(CVSS 9.0 – 10.0)



(CVSS 7.0 – 8.9)



(CVSS 4.0 – 6.9)



(CVSS 0.0 – 3.9)


Program Rules

  • Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
  • Submit one vulnerability per report unless you need to chain vulnerabilities to provide impact.
  • When duplicates occur, we only award the first report that was received.
  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
  • Social engineering (e.g., phishing, vishing, smishing) is prohibited.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.


Please e-mail all submissions to security@softnote.com with the subject “BUG BOUNTY” or fill out the form below. Your submission should include any steps required to reproduce or exploit the vulnerability. Please allow time for the vulnerability to be fixed before discussing any findings publicly. After receiving a submission, we will contact you with expected timelines for a fix to be implemented.

Happy bug hunting!

The Vulnerability Disclosure Policy (Bug Bounty Program Policy) must be followed in order to qualify for Bug Bounty Rewards.

Bug Bounty Program

    Add the type of the potential issue you have discovered.
    Estimate the severity of this issue.
    A clear and concise title includes the type of vulnerability and the impacted asset.
    What is the vulnerability? In clear steps, how do you reproduce it?
    What security impact could an attacker achieve?
    Help us understand how long it took you to find this vulnerability.

    By clicking the button, you are confirming that you have read and understood Tectum Privacy Policy.

    Thank you.
    You have successfully submitted your data