LocalMonero Whitehat Program For Security Researchers

Responsible Disclosure

Responsible disclosure includes:
    1. Providing us a reasonable amount of time to fix the issue before publishing it elsewhere.
    2. Making a good faith effort to not leak or destroy any LocalMonero user data.
    3. Not defrauding LocalMonero users or LocalMonero itself in the process of discovery.
In order to encourage responsible disclosure, we promise not to bring legal action against researchers who point out a problem provided they do their best to follow the above guidelines.

Eligibility

In general, anything which has the potential for financial loss or data breach is of sufficient severity is eligible, including:
    • XSS
    • CSRF
    • Authentication bypass or privilege escalation
    • Click jacking
    • Remote code execution
    • Obtaining user information
    • Accounting errors
In general, the following would not meet the threshold for severity:
    • Lack of password length restrictions
    • Merely showing that a page can be iFramed without finding a link on the page to be click-jacked.
    • Self-XSS
    • Denial of service
    • Spamming
    • Vulnerabilities in third party applications which make use of the LocalMonero API
    • Vulnerabilities which involve privileged access (e.g. rooting a phone) to a victim's device(s)
    • Logout CSRF
    • User existence/enumeration vulnerabilities
    • Password complexity requirements
    • Reports from automated tools or scans (without accompanying demonstration of exploitability)
    • Social engineering attacks against LocalMonero employees or contractors
    • Text-only injection in error pages
    • Automatic hyperlink construction by 3rd party email providers
    • Using email mutations (+, ., etc) to create multiple accounts for a single email
LocalMonero will determine at its discretion whether a vulnerability is eligible for a reward and the amount of the award.
Please note, while we are still a growing startup we are unable to provide enormous compensation.

Reporting

Please send a detailed step-by-step instruction on how to reproduce the bug to to [email protected].
By submitting a bug, you agree to be bound by the above rules.
Known issues SHA256.

Thank you for helping keep the Monero community safe!

© 2019 Blue Sunday Limited

About Terms of service Fees Contact us Security bounty Affiliate Statistics Tor hidden service I2P B32 I2P