Bug bounty
Triaged by Hackenproof

Linen API & Mobile: Program info

Linen API & Mobile

Company: Linen
KYC required
This program left 452 days ago
Program infoHackers (12)Reports

Linen is a self-custodial wallet built with Safe for iOS and Android devices. It eliminates a single point of failure related to private key management by providing easy wallet recovery based on multi-sig technology. Linen does not take custody of user assets, so its security policy is centered on how well the software allows users to safely and privately interact with their own assets

In scope
TargetTypeSeverityReward
https://apps.apple.com/app/apple-store/id1480509067
copy
Copy
success Copied
iOS
Critical
Bounty
https://api.linen.app/
copy
Copy
success Copied
API
Critical
Bounty
https://play.google.com/store/apps/details?id=app.linen.wallet
copy
Copy
success Copied
Android
Critical
Bounty
Target
https://apps.apple.com/app/apple-store/id1480509067
copy
Copy
success Copied
TypeiOS
Severity
Critical
RewardBounty
Target
https://api.linen.app/
copy
Copy
success Copied
TypeAPI
Severity
Critical
RewardBounty
Target
https://play.google.com/store/apps/details?id=app.linen.wallet
copy
Copy
success Copied
TypeAndroid
Severity
Critical
RewardBounty
Out of scope
TargetTypeSeverityReward
https://linen.app/
copy
Copy
success Copied
Web
None
Bounty
https://blog.linen.app/
copy
Copy
success Copied
Web
None
Bounty
https://support.linen.app/
copy
Copy
success Copied
Web
None
Bounty
Target
https://linen.app/
copy
Copy
success Copied
TypeWeb
Severity
None
RewardBounty
Target
https://blog.linen.app/
copy
Copy
success Copied
TypeWeb
Severity
None
RewardBounty
Target
https://support.linen.app/
copy
Copy
success Copied
TypeWeb
Severity
None
RewardBounty

Focus Area

Only the issues under the scope described above are eligible for the reward.

IN-SCOPE VULNERABILITIES (WEB, MOBILE)

We are interested in the following vulnerabilities:

  • Business logic issues
  • Access to assets stored in users' wallets
  • Payments manipulation
  • Remote code execution (RCE)
  • Injection vulnerabilities
  • Access Control Issues (IDOR, Privilege Escalation, etc)
  • Leakage of sensitive information: user emails, passwords or any personal information
  • Other vulnerability with a clear potential loss of assets

OUT OF SCOPE

  • Targets specified as "Out of scope"
  • MITM/physical access to a user’s device
  • SSL/TLS Configuration
  • Denial of Service attacks
  • Any third-party service used by Linen
  • Spam or Social Engineering techniques, including SPF and DKIM issues
  • Theoretical vulnerabilities without actual proof of concept
  • Information disclosure with minimal security impact (E.g., stack traces, path disclosure, directory listings, logs)
  • DNSSEC setup

Program Rules

  • Decisions on the eligibility and size of a reward are the sole discretion of Linen.
  • When possible, avoid privacy violations, degradation of user experience, and disruption to production systems or data during security testing.
  • Any activities conducted in a manner consistent with these rules and guidelines will be considered authorized conduct, and we will not initiate legal action against you.
  • In case that your findings is valid you will be asked for KYC verification to proceed with payments.
  • Filling in a W-9 or W-8ben form might be also requested.

Disclosure Guidelines

  • Report vulnerabilities as soon as you discover them, but keep the information confidential between yourself and the Linen team until we have resolved the issue.
  • Public disclosure of a vulnerability will make it ineligible for a bounty.

Eligibility and Coordinated Disclosure

We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • Issues must be new to the team. They cannot already been identified by another bounty hunter or by our audit.
  • The vulnerability must be a qualifying vulnerability.
  • Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through hackenproof.com.
  • You must send a clear textual description of the report along with steps to reproduce the issue, include attachments such as screenshots or proof of concept code as necessary.
  • Issues without steps to reproduce are ineligible for the bug bounty.
  • You must not be a former or current employee/contractor of us.
  • Decisions on the eligibility and size of a reward are at the sole discretion of Linen team.
Rewards
Range of bounty$50 - $10,000
Severity
Critical
$3,000 - $10,000
High
$500 - $1,000
Medium
$150 - $300
Low
$50 - $100
Stats
Scope Review18470
Submissions19
Total rewards$750
Types
apps
Hackers (12) View all
bugbountydegen
1
sh3rl0ck h0lm3s
2
zenython
3
barret brown
4
Chouat abderrahmane
5
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response5d
Triage Time5d
Reward Time5d
Resolution Time14d