LocalMonero Whitehat Program For Security Researchers
Responsible disclosure includes:
1. Providing us a reasonable amount of time to fix the issue before publishing it elsewhere.
2. Making a good faith effort to not leak or destroy any LocalMonero user data.
3. Not defrauding LocalMonero users or LocalMonero itself in the process of discovery.In order to encourage responsible disclosure, we promise not to bring legal action against researchers who point out a problem provided they do their best to follow the above guidelines.
In general, anything which has the potential for financial loss or data breach is of sufficient severity is eligible, including:
• Authentication bypass or privilege escalation
• Obtaining user informationIn general, the following would not meet the threshold for severity:
• Lack of password length restrictions
• Merely showing that a page can be iFramed without finding a link on the page to be click-jacked.
• Vulnerabilities in third party applications which make use of the LocalMonero API
• Vulnerabilities which involve privileged access (e.g. rooting a phone) to a victim's device(s)
• User existence/enumeration vulnerabilities
• Password complexity requirements
• Reports from automated tools or scans (without accompanying demonstration of exploitability)
• Social engineering attacks against LocalMonero employees or contractors
• Text-only injection in error pages
• Automatic hyperlink construction by 3rd party email providers
• Using email mutations (+, ., etc) to create multiple accounts for a single emailLocalMonero will determine at its discretion whether a vulnerability is eligible for a reward and the amount of the award.
Please note, while we are still a growing startup we are unable to provide enormous compensation.
Please send a detailed step-by-step instruction on how to reproduce the bug to to [email protected].
By submitting a bug, you agree to be bound by the above rules.
Known issues SHA256.
Thank you for helping keep the Monero community safe!