Startseite

Bug-Bounty-Program

Our Bug Bounty Program offers potential rewards to encourage security researchers to inform us about bugs or vulnerabilities, so that we can fix them long before any damage is done.

Disclosure Agreement & Bug-Bounty-Program Agreement

Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

No technology is perfect. As an IT company, we take the security of our products and services very seriously. We believe it is important to work with highly qualified security researchers around the world to create secure solutions. In particular, we appreciate the work of the White Hat community, who responsibly report vulnerabilities.

How to report a potential security breach?

If you find a possible security vulnerability, please send the following information to this email address and add the following details:

  • products, URLs,… concerned
  • technical description
  • system details (browser,…)
  • proof of concept how the vulnerability could be exploited
  • possible impact of the vulnerability

We will only accept submissions that include the above items and are submitted via THIS FORM.

What happens after you submit a potential vulnerability under this Bug-Bounty-Program?

  • We will check if this type of vulnerability has already been submitted.
  • Depending on the type of reported vulnerability (risk, potential impact, number of vulnerable users and other aspects), you could receive a bug bounty award under this program. Potential rewards range from T-shirts to USD 150.
  • On average, we get back to you within 7 working-days.

Hall of Fame

We would like to thank all security researchers who support us in this bug bounty program.

War dieser Beitrag hilfreich?
Vielen Dank für deine Bewertung!

+49 322 13 321 658

info@hellocash.de