Bug Bounty Program
To continuously enhance platform security, EasiCoin officially launches its Bug Bounty Program. We welcome security researchers and members of the technical community worldwide to participate in identifying and reporting potential vulnerabilities, working together to build a more robust and secure digital asset trading environment.
How to Participate
If you discover any potential vulnerabilities related to EasiCoin systems, please submit a detailed report to:
Security Report Email: [email protected]
Our security team will promptly review and evaluate your submission and get in touch with you for further verification and follow-up.
Scope
This program applies to:
All subdomains and systems under the domain *.easicoin.io
Reward Policy
Rewards are issued based on the severity, exploitability, technical complexity, and potential impact of the reported issue. The reward amount and method of issuance are subject to internal assessment and discretion.
Web Vulnerability Categories
Critical Severity
Unauthorized access to core control systems
Compromise of major internal infrastructure
Full access to backend super admin systems
Smart contract overflows or logic bypass with fund impact
Examples: full server takeover, critical data modification or leakage
High Severity
Remote command execution / Getshell
SQL injection, SSRF, XXE
Arbitrary file read or write
Unauthorized access to fund-related operations
Smart contract privilege design flaws
Medium Severity
Stored XSS or CSRF in core business processes
Denial-of-service (DoS) vulnerabilities
CAPTCHA bypass, sensitive data exposure
Low Severity
Client-side crash
DOM-based or reflective XSS
Open redirect, non-critical CSRF or path traversal
Non-qualifying Submissions (not eligible for reward)
Email spoofing, user enumeration, self-XSS
Missing CSP/SRI headers, non-impactful clickjacking
Software version disclosures
Social engineering or attacks targeting EasiCoin staff
Smart Contract Vulnerability Criteria
Critical Severity
Manipulation of governance or voting results
Theft or permanent lock-up of user funds
Insolvency exploits, MEV attack vectors
High Severity
Exploits to steal or freeze unclaimed rewards
Logic bugs causing fund inaccessibility or protocol halt
Medium Severity
Transaction failures due to missing tokens or DoS
Abnormal gas consumption
Low Severity
Yield promise inconsistencies (without actual loss)
Governance risks, centralization flags, information asymmetries
Code of Conduct
To ensure responsible disclosure, participants must follow these ethical and legal guidelines:
No social engineering, phishing, or unauthorized access to employee data
Do not publicly disclose or share details of discovered vulnerabilities
Do not deploy malicious payloads (e.g., cookie theft scripts)
Do not perform destructive testing or exploit production systems
Do not use automated scanners to probe without consent
Only minimal proof-of-concept (PoC) demonstrations are allowed
If unintended issues arise during testing, please report them immediately. Violations of these rules may result in disqualification and legal action.
Acknowledgment
Each valid submission is a contribution to the strengthening of the EasiCoin ecosystem. We deeply appreciate your efforts and collaboration. Together, we strive to make EasiCoin—and the broader Web3 space—safer and more resilient.
最后更新于