Bounty
At Eneba we’re happy to cooperate with the security research community and maintain a reward program for issues found.
If you believe you’ve detected a security issue and wish to claim a reward, please check the guidelines below.
Qualifying issues
Any issue that affects the confidentiality or integrity of user data is likely to be in the scope for this program. Common examples include:
- Cross-site scripting
- Cross-site request forgery
- Mixed-content scripts
- Authentication or authorization flaws
- Server-side code execution bugs
- Ability to retrieve keys not belonging to the user
- Bypassing user verification procedures
Non-qualifying issues
Due to limited impact and/or resources required, certain issues may not qualify for a reward.
- Issues requiring unlikely user actions. E.g. if a user needs to enter something manually in the console or install additional software, will not qualify.
- Denial of Service vulnerabilities(DoS).
- URL redirection.
- Email spoofing for eneba.com domain. We are aware of issues that might arise with spoofed emails but it’s not something we deem a reward-worthy issue.
- Enumeration attack. Bruteforce attacks will not be considered for a reward unless you demonstrate that there is a rate-limiting issue.
Disclosure procedure
Keep in mind that:
- We will resolve the issue within 30 days of the disclosure.
- The bounty will be decided and paid out after the resolution.
- If the issue is disclosed elsewhere prior to the resolution it will be disqualified from receiving the reward.
For submission, please include:
- Full description of the vulnerability including the exploitability and impact.
- Document all steps required to reproduce the vulnerability.
- PoC in video/screenshots.
- Affected URL(s).
- Files attempted to upload.
Report vulnerabilities to us by email security@eneba.com