Bounty
At Eneba we’re happy to cooperate with the security research community and maintain a reward program for issues found.
If you believe you’ve detected a security issue and wish to claim a reward, please check the guidelines below.
Qualifying issues
- Cross-site scripting
- Cross-site request forgery
- Mixed-content scripts
- Authentication or authorization flaws
- Server-side code execution bugs
- Ability to retrieve keys not belonging to the user
- Bypassing user verification procedures
Non-qualifying issues
Due to limited impact and/or resources required, certain issues may not qualify for a reward.
- Issues requiring unlikely user actions. E.g. if a user needs to enter something manually in the console it will not qualify.
- Email spoofing for eneba.com domain. We are aware of issues that might arise with spoofed emails but it’s not something we deem a reward worthy issue.
- Enumeration attack. Bruteforce attacks will not be considered for a reward unless you demonstrate that there is a rate-limiting issue.
Disclosure procedure
- Summarise the issue(s) that you have found.
- Describe the attack vector that can be taken advantage of.
- Add video/screenshots that might help with understanding the issue.
- Compile the information and send it to bounty@eneba.com
- We will resolve the issue within 30 days of the disclosure.
- The bounty will be decided and paid out after the resolution.
If the issue is disclosed elsewhere prior to the resolution it will be disqualified from receiving the reward.