Bug bounty
Triaged by Hackenproof

Telegram Apps Center: Program info

Telegram Apps Center

Company: TON Studio
This program is active now
Program infoHackers (10)Reports

Community-driven catalog of applications developed by third-party developers.

This bug bounty program is focused on https://t.me/tapps itself and TON apps which are listed within this bot.

In scope
TargetTypeSeverityReward
https://t.me/tapps
copy
Copy
success Copied
Other
Critical
Bounty
Apps which are listed within @tapps bot and meet TON-based criteria
copy
Copy
success Copied
Other
None
Bounty
https://t.me/Open_league_bot
copy
Copy
success Copied
Other
None
Bounty
Target
https://t.me/tapps
copy
Copy
success Copied
TypeOther
Severity
Critical
RewardBounty
Target
Apps which are listed within @tapps bot and meet TON-based criteria
copy
Copy
success Copied
TypeOther
Severity
None
RewardBounty
Target
https://t.me/Open_league_bot
copy
Copy
success Copied
TypeOther
Severity
None
RewardBounty

Focus Area

IN-SCOPE VULNERABILITIES (Telegram BOT)

We are interested in the following vulnerabilities:

  • Business logic issues
  • Payments manipulation
  • Remote code execution (RCE)
  • Injection vulnerabilities (SQL, XXE)
  • File inclusions (Local & Remote)
  • Access Control Issues (IDOR, Privilege Escalation, etc)
  • Leakage of sensitive information
  • Server-Side Request Forgery (SSRF)
  • Directory traversal
  • Other vulnerability with a clear potential loss

OUT OF SCOPE

Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:

  • Vulnerabilities in Telegram applications
  • Assets that do not belong to the company
  • Best practices concerns
  • Recently (less than 30 days) disclosed 0day vulnerabilities
  • Vulnerabilities affecting users of outdated browsers or platforms
  • Social engineering, phishing, physical, or other fraud activities
  • Reports that generated by scanners or any automated or active exploit tools
  • Vulnerabilities involving active content such as web browser add-ons
  • Most brute-forcing issues without clear impact
  • Denial of service (DoS/DDoS)
  • Theoretical issues
  • Moderately Sensitive Information Disclosure
  • Spam (sms, email, etc)
  • MitM and local attacks
  • Attacks requiring physical access to a user's device
  • Vulnerabilities that require root/jailbreak
  • Vulnerabilities requiring extensive user interaction

Program Rules

*Hackers must ensure the application meets the specified criteria before starting testing

Disclosure Guidelines

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed for the moment.
  • Please do NOT publish/discuss bugs

Eligibility and Coordinated Disclosure

Reports for applications must include:

  • Confirmation of on-chain interaction.
  • Blockchain interaction logs (e.g., transaction hashes, smart contract IDs, or interaction with TON APIs).

Criteria for Applications under the Bug Bounty Program

In Scope

At least one of the following must be met

On-Chain Interaction via TON Blockchain

  1. The application performs transactions recorded on the TON Blockchain (e.g., payments for goods, participation in DAO, interaction with NFTs, or any smart contracts on TON).
  2. The application uses smart contracts to execute application logic.

Integration with TON Ecosystem

  1. The application utilizes mechanics directly tied to TON (e.g., token airdrops with verified smart contract logic, TON DNS, TON Storage, or other similar tools).
  2. The application provides functionality exclusively accessible through TON Wallet (e.g., using TON Connect for authorization and operations related to TON).

Interaction with TON Wallet

  1. The application must include functionality beyond simple authorization via TON Connect.
  2. Users can perform actions requiring transaction signatures via TON Wallet.
  3. TON Wallet usage is verified for business-critical operations (e.g., payments, subscriptions, asset withdrawals/deposits).

Out of Scope

  1. Applications using only TON Connect for login without additional TON Blockchain mechanics.
  2. Airdrops without actual on-chain interaction or verified smart contracts.
  3. Applications that claim future TON integration but lack it in the current version.
  4. Applications operating exclusively on testnet instead of mainnet.
Rewards
Range of bounty$100 - $1,500
Severity
Critical
$750 - $1,500
High
$400 - $750
Medium
$200 - $400
Low
$100 - $200
Stats
Scope Review11634
Submissions64
Total rewards$4,700
Types
Web
Project types
Other
Hackers (10) View all
H1xploit
1
2
3
dglabz
4
Zakaria eddafri
5
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time3d
Reward Time3d
Resolution Time60d