We take your data security seriously and with utmost prudence. Keeping this goal in mind, Ezio has decided to welcome security researchers to hunt down vulnerabilities. Our bounty program allows researchers and provides rewards for critical vulnerabilities.
Here are a few guidelines you need to follow to harness our program and to make the most out of it.
What we are looking for
We are in search of any security exploit; however, we will be extra generous with:
Please keep in mind, our bounty program doesn’t concern regular bugs but only security flaws allowing intruders to gain access to other’s data. If you wish to report a security flaw, contact us at firstname.lastname@example.org
Our reward system is flexible and simple. We don’t have any strict upper or lower limit which means all submissions are rated using a purposefully simple scale. These include the complexity of successfully exploiting the vulnerability, the potential exposure and impact. The amount will be based on the severity of the vulnerability and will be sent using Online Transfer once the issue has been fixed. These services collect a processing fee which will be deducted from the rewarded amount.
If you’ve found a vulnerability, please submit your report at email@example.com.
We are always here to answer your submissions and to clarify your doubts. If you have any queries or questions regarding our program, reach us at firstname.lastname@example.org.
*Note Bounty Program is appliable only after our website complete launch process. Now it’s a Beta Launch*