Web sites, web apps and mini apps operated by TON Society.
Target | Type | Severity | Reward |
---|---|---|---|
ton.org Copy Copied | Web | High | Bounty |
society.ton.org Copy Copied | Web | High | Bounty |
blog.ton.org Copy Copied | Web | Medium | Bounty |
ton.org/api Copy Copied API routing and endpoints as Node.js serverless functions. Handles integration with CMS. | API | Medium | Bounty |
society.ton.org/api Copy Copied API routing and endpoints as Node.js serverless functions. Handles integration with CMS. | API | Medium | Bounty |
society.ton.org/v1 Copy Copied TON Society backend services that handle various integrations including content management, interaction with TON blockchain APIs, etc. | API | Medium | Bounty |
blog.ton.org/api Copy Copied API routing and endpoints as Node.js serverless functions. Handles integration with CMS and search engine. | API | Medium | Bounty |
society.ton.org: cSBT claiming Copy Copied Issuing cSBTs covering APIs and UI part | Web | Critical | Bounty |
t.me/theontonbot: events participation Copy Copied Online events participation with claiming cSBTs. | Web | High | Bounty |
t.me/theontonbot: NFT tickets sales Copy Copied | Web | Critical | Bounty |
API routing and endpoints as Node.js serverless functions. Handles integration with CMS.
API routing and endpoints as Node.js serverless functions. Handles integration with CMS.
TON Society backend services that handle various integrations including content management, interaction with TON blockchain APIs, etc.
API routing and endpoints as Node.js serverless functions. Handles integration with CMS and search engine.
Issuing cSBTs covering APIs and UI part
Online events participation with claiming cSBTs.
Target | Type | Severity | Reward |
---|---|---|---|
docs.ton.org Copy Copied | Web | None | Bounty |
We are interested in the following vulnerabilities:
We are interested in the following vulnerabilities:
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
We are happy to thank everyone who submits valid reports which help us improve the security. However, only those that meet the following eligibility requirements may receive a monetary reward: