Bug Bounty Bug Bounty Bug Bounty
Find a vulnerability in the AvanChange service and get a reward. We are grateful to everyone who detects bugs and together with us makes AvanChange more reliable.
Find a vulnerability in the AvanChange service and get a reward. We are grateful to everyone who detects bugs and together with us makes AvanChange more reliable.
Bug bounty is an open competition to find vulnerabilities in a product. There are several approaches to testing services. The standard one - when testers from the team test the service themselves before its release. Also, the second, unusual one is bug bounty. This is a contest where hackers and programmers are offered to find bugs and vulnerabilities in a service for a fee. It works like this:
Bug Bounty is an opportunity for us to make our products even better and show that our services are reliable. Every day our project expands and scales, which requires constant debugging and tracking of all processes. We are often approached by our users, who are related to the IT sphere, and on a voluntary basis they tell us about these or those bugs. By systematizing these processes, we will be able to reward everyone who helps us become better.
It is quite difficult to define strict limits and remuneration prices, as vulnerabilities and bugs can be of different nature and cause different severity of damage to the service. However, we have tried to develop a scale that will allow you to estimate your labor costs according to their importance.
Vulnerability | Reward |
---|---|
Remote code execution (RCE) | 1,000 – 3,500 USDT |
Injections | 500 – 1,500 USDT |
IDORs / Disclosure of protected personal data | 200 – 1,000 USDT |
Cross-Site Scripting (XSS) exlude self-XSS & domains *.avanchange.com | 150 – 1,000 USDT |
Different ways of frod | 100 – 300 USDT |
Minor bugs | 5 – 100 USDT |
Other | Depends on the criticality |
In the case of frod, the reward depends on the scalability of the particular method of such fraud, the ease of use and the level of damage caused. Decisions on the level of criticality are made in conjunction with our developers. This may take some time, up to 2-4 weeks on average.
AvanChange does not pay remuneration for:
We have no strict requirements for bug bounty participants. Anyone can try their hand and get rewarded for it! When vulnerabilities are identified, please make a report document describing the vulnerabilities themselves and methods of exploitation. You can send the report to code@vanchange.com.
Subscribe to our Telegram Channel to not miss out on great giveaways and discounts.