The program focuses on identifying vulnerabilities that impact the overall platform. It complements our product-specific programs.
Target | Type | Severity | Reward |
---|---|---|---|
app.1inch.io Copy | Web | Critical | Bounty |
1inch.io Copy | Web | Medium | Bounty |
blog.1inch.io Copy | Web | Medium | Bounty |
api.1inch.dev Copy | API | Critical | Bounty |
portal.1inch.dev Copy | Web | Critical | Bounty |
portal.1inch.dev/documentation Copy | Web | Critical | Bounty |
1inch.dev Copy | Web | Medium | Bounty |
1inch social media accounts and infrastructure Copy | Other | Critical | Bounty |
Rest related to 1inch Copy | Other | Medium | Bounty |
The following vulnerabilities are considered in-scope:
All in-scope vulnerability reports must include a Proof of Concept (PoC) that demonstrates real-world impact. Submissions without a PoC will not be considered.
Vulnerabilities identified in out-of-scope resources are generally not eligible for rewards unless they present a significant business risk, as determined at our sole discretion.
The following items are generally excluded from reward eligibility due to insufficient severity or lack of relevance to the program’s defined scope:
We value all valid reports that help us strengthen our security. To qualify for a monetary reward, the following eligibility conditions must be fulfilled: