Bug bounty
Triaged by HackenProof

TTC | SDK: Program info

TTC | SDK

Company: TTC
This program left 1798 days ago
Program infoHackers

The SDK allows developers and communities to easily integrate TTC Protocol into their services which will grant access to the TTC Ecosystem. The release of TTC SDK lays the foundation for DAPPs in TTC Ecosystem and TReE (TTC Reward Engine.) Currently, TTC SDK is implemented into tataUFO and ALIVE, the first two DAPPs in the TTC Ecosystem.

In scope
TargetTypeSeverityReward
TTC SDK Android
  • https://github.com/TTCECO/TTCSDK_Android
Android
Critical
Bounty
TTC SDK iOS
  • https://github.com/TTCECO/TTCSDK_iOS
iOS
Critical
Bounty
Target
TTC SDK Android
  • https://github.com/TTCECO/TTCSDK_Android
TypeAndroid
Severity
Critical
RewardBounty
Target
TTC SDK iOS
  • https://github.com/TTCECO/TTCSDK_iOS
TypeiOS
Severity
Critical
RewardBounty

Focus Area

Documentation


  1. TTC SDK Docs - https://docs.ttc.eco/
  2. Getting Started with the TTC SDK for Android - https://docs.ttc.eco/Android/
  3. Getting Started with the TTC SDK for iOS - https://docs.ttc.eco/ios/

In-Scope Vulnerabilities


TTC accepts all reports that demonstrate vulnerabilities and has real-life impact. Those reports are rewarded in accordance to the severity of the vulnerability. Some examples of security issues in scope of the program for TTC are listed below:

  1. Business Logic
  2. Privilege escalation
  3. Cryptography issues
  4. Account management flows
  5. Transactions forging
  6. Database vulnerability
  7. Privilege escalation
  8. Authentication bypass
  9. Sensitive data exposure

Program Rules

  1. Avoid compromising any personal data, interruption or degradation of any service .
  2. Don’t access or modify other user data, localize all tests to your accounts.
  3. Don’t exploit any DoS/DDoS vulnerabilities, social engineering attacks or spam.
  4. In case you find chain vulnerabilities we pay only for vulnerability with the highest severity.
  5. Only the first valid bug is eligible for reward.
  6. Don’t disclose publicly any vulnerability until you are granted permission to do so.
  7. Don’t break any law and stay in the defined scope.
  8. Any details of found vulnerabilities must not be communicated to anyone who is not a HackenProof Team or an authorized employee of this Company without appropriate permission.
  9. Comply with the rules of the program.
  10. The rewards will be paid out in HKN based on the current price.
Rewards
Range of bounty$0 - $0
Severity
Critical
$0
High
$0
Medium
$0
Low
$0
Stats
Total rewards0
Reports submitted1
Types
mobileblockchain
Hackers (2) View all
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time3d
Reward Time5d
Resolution Time7d