Bug bounty
Triaged by HackenProof

Avalanche Websites and APIs: Program info

Avalanche Websites and APIs

Company: Avalanche
This program left 290 days ago
Program infoHackers
In scope
TargetTypeSeverityReward
*.avalabs.org
Web
Critical
Bounty
*.avax.network
Web
Critical
Bounty
*.avax-test.network
Web
Critical
Bounty
api.avax.network
API
Critical
Bounty
api.avax-test.network
API
Critical
Bounty
*.avax-dev.network
Web
Critical
Bounty
support.avalabs.org
Web
None
Bounty
Avalanche-Wallet

https://github.com/ava-labs/Avalanche-Wallet

Web
Critical
Bounty
AvalancheJS

https://github.com/ava-labs/AvalancheJS

Web
Critical
Bounty
Avalanche-Wallet-SDK

https://github.com/ava-labs/Avalanche-Wallet-SDK

Web
Critical
Bounty
Target
*.avalabs.org
TypeWeb
Severity
Critical
RewardBounty
Target
*.avax.network
TypeWeb
Severity
Critical
RewardBounty
Target
*.avax-test.network
TypeWeb
Severity
Critical
RewardBounty
Target
api.avax.network
TypeAPI
Severity
Critical
RewardBounty
Target
api.avax-test.network
TypeAPI
Severity
Critical
RewardBounty
Target
*.avax-dev.network
TypeWeb
Severity
Critical
RewardBounty
Target
support.avalabs.org
TypeWeb
Severity
None
RewardBounty
Target
Avalanche-Wallet

https://github.com/ava-labs/Avalanche-Wallet

TypeWeb
Severity
Critical
RewardBounty
Target
AvalancheJS

https://github.com/ava-labs/AvalancheJS

TypeWeb
Severity
Critical
RewardBounty
Target
Avalanche-Wallet-SDK

https://github.com/ava-labs/Avalanche-Wallet-SDK

TypeWeb
Severity
Critical
RewardBounty
Out of scope
TargetTypeSeverityReward
chat.avax.network
Web
None
Bounty
docs.avax.network
Web
None
Bounty
chat.avalabs.org
Web
None
Bounty
buy.avax.network
Web
None
Bounty
*.snowtrace.io
Web
None
Bounty
community.avax.network
Web
None
Bounty
test*.avax.network
Web
None
Bounty
forum.avax.netowrk
Web
None
Bounty
avalanche-hub.com
Web
None
Bounty
academy.avax.network
Web
None
Bounty
*.avacloud.io
Web
None
Bounty
Target
chat.avax.network
TypeWeb
Severity
None
RewardBounty
Target
docs.avax.network
TypeWeb
Severity
None
RewardBounty
Target
chat.avalabs.org
TypeWeb
Severity
None
RewardBounty
Target
buy.avax.network
TypeWeb
Severity
None
RewardBounty
Target
*.snowtrace.io
TypeWeb
Severity
None
RewardBounty
Target
community.avax.network
TypeWeb
Severity
None
RewardBounty
Target
test*.avax.network
TypeWeb
Severity
None
RewardBounty
Target
forum.avax.netowrk
TypeWeb
Severity
None
RewardBounty
Target
avalanche-hub.com
TypeWeb
Severity
None
RewardBounty
Target
academy.avax.network
TypeWeb
Severity
None
RewardBounty
Target
*.avacloud.io
TypeWeb
Severity
None
RewardBounty

Focus Area

In-Scope Vulnerabilities

  • Unauthorized remote code execution
  • Domain takeover
  • Injection attacks
  • Leaked secrets or sensitive information
  • Account takeover
  • Access control flaws
  • Other vulnerability with a clear potential loss

Out-of-Scope Vulnerabilities

  • Any Denial-of-Service/Spam Attack of any API
  • Vulnerabilities in third-party applications
  • Unexploitable theoretical or best practices concerns
  • Recently (less than 30 days) disclosed 0day vulnerabilities
  • Vulnerabilities affecting users of outdated browsers or platforms
  • Social engineering, spam, phishing, physical, or other fraud activities
  • Most brute-forcing issues without clear impact
  • Non-sensitive Information Disclosure
  • Clickjacking/Tapjacking and issues only exploitable through clickjacking/tap jacking
  • Self-XSS that cannot be used to exploit other users
  • Missing cookie flags on non-sensitive cookies
  • CSRF on unauthenticated endpoints
  • OPTIONS/TRACE HTTP method enabled
  • Host header issues without proof-of-concept demonstrating the vulnerability
  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
  • Any attacks requiring physical access to a user's device
  • CSP issues unless exploitable with POC

Program Rules

  • Only reports of new, unknown vulnerabilities are eligible for a reward. A vulnerability is known (i.e. a duplicate) if it’s already been reported externally or discovered internally.
  • Vulnerabilities already publicly disclosed will not be eligible for a reward.
  • After reporting, details of a vulnerability may only be made public with expressed authorization from Ava Labs.
  • Avoid using web application scanners for automatic vulnerability searching which generates massive traffic
  • Do not intentionally exploit any vulnerabilities you found:
  • Avoid causing damage or restrict the availability of products, services or infrastructure
  • Don’t access or modify user data you do not own, localize all tests to your accounts
  • Perform testing only within the scope
  • Intimidation, threats against Ava Labs team members and community, whether actual or simulated, are strictly forbidden
  • Social engineering (including phishing) targeting Ava Labs team members and community is strictly forbidden
  • Physical intrusion attempts targeting Ava Labs' property or data centers is strictly forbidden.
  • In case you find chain vulnerabilities you’ll be eligible for the reward based on overall severity.
  • You are responsible for staying within your local laws.
  • Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or Ava Labs security team member.
  • We strive to maintain a healthy relationship with the security research community and base our report evaluation on industry norms and logical reasoning. However, in case of any disputes, our decision is final.
Rewards
Range of bounty$100 - $10,000
Severity
Critical
$5,000 - $10,000
High
$1,000 - $5,000
Medium
$500 - $1,000
Low
$100 - $500
Stats
Total rewards$21,550
Reports submitted261
Types
webblockchainsmart contract
Hackers (5) View all
Abhishek Birdawade
2
YAUHENI SAVUSHKIN
3
Shobhit Kumar Gangwar
4
Abdullah
5
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time5d
Reward Time14d
Resolution Time30d