NonKYC is a privacy-focused cryptocurrency exchange providing a fast and secure trading experience with no KYC requirements.
Our platform includes:
- Web interface
- Mobile application (Android)
- WebSocket API
- REST API
We invite ethical hackers to help us identify potential vulnerabilities and ensure the security of our infrastructure and our users’ funds.
This program covers all actively deployed production environments unless explicitly stated otherwise in the "Out of Scope" section.
IN SCOPE VULNERABILITIES: WEB VULNERABILITIES
We are interested in the following vulnerabilities:
- Business logic issues
- Payments manipulation
- Remote code execution (RCE)
- Injection vulnerabilities (SQL, XXE)
- File inclusions (Local & Remote)
- Access Control Issues (IDOR, Privilege Escalation, etc)
- Leakage of sensitive information
- Server-Side Request Forgery (SSRF)
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Directory traversal
- Other vulnerabilities with a clear potential loss
OUT OF SCOPE: WEB VULNERABILITIES
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
- Vulnerabilities in third-party applications
- Assets that do not belong to the company
- Best practices concerns
- Recently (less than 30 days) disclosed 0day vulnerabilities
- Vulnerabilities affecting users of outdated browsers or platforms
- Social engineering, phishing, physical, or other fraud activities
- Publicly accessible login panels without proof of exploitation
- Reports that state that software is out of date/vulnerable without a proof of concept
- Reports generated by scanners or any automated or active exploit tools
- Vulnerabilities involving active content such as web browser add-ons
- Most brute-forcing issues without clear impact
- Denial of service (DoS/DDoS)
- Theoretical issues
- Moderately Sensitive Information Disclosure
- Spam (sms, email, etc)
- Missing HTTP security headers
- Infrastructure vulnerabilities, including:
- Certificates/TLS/SSL-related issues;
- DNS issues (i.e. MX records, SPF records, DMARC records etc.);
- Server configuration issues (i.e., open ports, TLS, etc.)
- Open redirects
- Session fixation
- User account enumeration
- Clickjacking/Tapjacking and issues only exploitable through clickjacking/tapjacking
- Descriptive error messages (e.g. Stack Traces, application or server errors)
- Self-XSS that cannot be used to exploit other users
- Login & Logout CSRF
- Weak Captcha/Captcha Bypass
- Lack of Secure and HTTPOnly cookie flags
- Username/email enumeration via Login/Forgot Password Page error messages
- CSRF in forms that are available to anonymous users (e.g. the contact form)
- OPTIONS/TRACE HTTP method enabled
- Host header issues without proof-of-concept demonstrating clear security impact
- Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
- Content Spoofing without embedded links/HTML
- Reflected File Download (RFD)
- Mixed HTTP Content
- HTTPS Mixed Content Scripts
- Manipulation with Password Reset Token
- MitM and local attacks
- Response manipulations without demonstration of system state change
IN SCOPE VULNERABILITIES (WSS Protocol)
We are interested in the following vulnerabilities related to our WebSocket protocol:
- Unauthorized subscription to private channels
- Injection attacks in WebSocket messages
- Manipulation of real-time market data (price spoofing, fake volume, etc.)
- Race conditions or desynchronization of client state
- Leakage of sensitive data over WebSocket
- Authentication/authorization bypass through WebSocket
- Message tampering or replay attacks with valid tokens
OUT OF SCOPE VULNERABILITIES (WSS Protocol)
- Disconnection due to rate limits or idle timeout
- Lack of encryption (already handled via TLS/WSS)
- Missing ping/pong or keepalive messages
- Theoretical latency or delay-related issues
- Public data feed enumeration without sensitive impact
- Replay attacks without authentication token compromise
- Behavior that doesn't result in any actionable impact or loss
IN SCOPE VULNERABILITIES (Android .apk)
We are interested in the following vulnerabilities within our Android mobile application:
- Insecure local storage of sensitive data (e.g. keys, tokens)
- Insecure communication with backend services
- Hardcoded secrets, API keys, or credentials in the APK
- Authentication or session management flaws
- Code tampering or reverse engineering that leads to business logic abuse
- Abuse of app components (e.g. unprotected Activities, Services, Broadcasts)
- Unauthorized actions via IPC (intent spoofing)
- App allowing trading/withdrawals without proper verification
OUT OF SCOPE VULNERABILITIES (Android .apk)
- Debug logs or stack traces with no sensitive data
- Issues only present on rooted devices or emulators
- Lack of obfuscation or code minification
- Best practices issues without real security impact
- Usage of third-party libraries with no exploitable vector in this app
- Crashes without proven impact on confidentiality, integrity, or availability
- Low-impact UI/UX flaws that don’t lead to abuse or data exposure
- Presence of hardcoded API or Google keys that do not grant access to sensitive resources or cannot be exploited in practice