binfince.com
Open in
urlscan Pro
172.67.156.64
Public Scan
Submitted URL: http://binfince.com/bug-bounty
Effective URL: https://binfince.com/bug-bounty
Submission: On October 29 via api from US — Scanned from DE
Effective URL: https://binfince.com/bug-bounty
Submission: On October 29 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* * * binfince * Trade * Trade Trade in a second * Buy Crypto * Express buy Visa/MasterCard powered * Market Tools * Crypto Market Cap Most of the available crypto assets and sorts them based on the market capitalization * Market Screener Powerful tool that allows to filter instruments based on fundamental data and various technical indicators * Technical Analysis Advanced tool that displays ratings based on technical indicators * Cross Rates Real-time quotes of the selected currencies in comparison to the other major currencies at a glance * Currency Heat Map Quick overview of action in the currency markets * Finance * Earn Don't Just HODL — Grow Your Crypto Holdings The Smart Way * News * * Create Account * Sign In * Create Account * * Sign In ********** UID: 0 Deposit Withdraw * Profile * Transfer * Orders * Transaction History * Referral Rewards * Recently logged in * Settings * * FAQ Logout BUG BOUNTY PROGRAM The safety of our users’ funds and personal data is our main priority, therefore, the security of our platform and services is the field we work on daily and implement a number of advanced security technologies. Nevertheless, the contribution of the security researchers, who assist us in keeping our products and users safe, is extremely important for us, that is why we launched a vulnerability detection bounty program. The terms and conditions of our bug bounty program are described in this Bug Bounty Policy. Ineligibility Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold: WEB * ● Vulnerabilities in third-party applications * ● Spam (SMS, email, etc) * ● Best practices concerns without real security impact * ● Recently (less than 30 days) disclosed vulnerabilities * ● Vulnerabilities affecting users of outdated browsers or platforms * ● Social engineering, phishing, physical, or other fraud activities * ● Publicly accessible login panels without proof of exploitation * ● Reports that state that software is out of date/vulnerable without a proof of concept * ● Vulnerabilities involving active content such as web browser add-ons * ● Most brute-forcing issues without clear impact * ● Theoretical issues * ● Missing HTTP security headers without real security impact * ● TLS/SSL сertificates related issues * ● DNS issues (i.e. MX records, SPF records, etc.) * ● Server configuration issues (i.e., open ports, TLS, etc.) * ● Open redirects * ● Session fixation * ● User account enumeration * ● Clickjacking/Tapjacking and issues only exploitable through clickjacking/tap jacking * ● Descriptive error messages (e.g. Stack Traces, application or server errors) * ● Self-XSS that cannot be used to exploit other users * ● Login & Logout CSRF * ● Weak Captcha/Captcha Bypass without clear impact * ● Lack of Secure and HTTPOnly cookie flags * ● Username/email enumeration via Login/Forgot Password Page error messages * ● CSRF in forms that are available to anonymous users (e.g. the contact form) * ● OPTIONS/TRACE HTTP method enabled * ● Host header issues without proof-of-concept demonstrating the vulnerability * ● Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS * ● Content Spoofing without embedded links/HTML * ● Reflected File Download (RFD) without clear impact * ● Mixed HTTP Content * ● HTTPS Mixed Content Scripts * ● DoS/DDoS issues * ● Manipulation with Password Reset Token * ● MitM and local attacks * ● Vulnerabilities already known to us, or already reported by someone else (reward goes to first reporter) * ● Issues without any security impact MOBILE * ● Attacks requiring physical access to a user's device * ● Vulnerabilities requiring extensive user interaction * ● Exposure of non-sensitive data on the device * ● Reports from static analysis of the binary without PoC that impacts business logic * ● Lack of obfuscation/binary protection/root (jailbreak) detection * ● Bypass certificate pinning on rooted devices * ● Lack of Exploit mitigations i.e., PIE, ARC, or Stack Canaries * ● Sensitive data in URLs/request bodies when protected by TLS * ● OAuth & app secret hard-coded/recoverable in IPA, APK * ● Sensitive information retained as plaintext in the device’s memory * ● Crashes due to malformed URL Schemes or Intents sent to exported Activity/Service/Broadcast Receiver (exploiting these for sensitive data leakage is commonly in scope) * ● Any kind of sensitive data stored in app private directory * ● Runtime hacking exploits using tools like but not limited to Frida/Appmon (exploits only possible in a jailbroken environment) * ● Any URIs leaked because a malicious app has permission to view URIs opened * ● Exposure of API keys with no security impact (Google Maps API keys etc.) Reward There is no limit on the maximum and minimum reward size, we reserve the right to increase or decrease the size of the reward depending on the seriousness of the vulnerability found. Researchers are more likely to receive increased rewards if they can demonstrate how the found vulnerability may be used to cause the most harm. Remote code execution: $10,000 Manipulating user balances: $10,000 XSS/CSRF/Clickjacking affecting user balances/trading/exchange/deposits: $2,000 Theft of information related to passwords/API keys/personal information: $2,000 Partial authentication bypass: $1,500 Other vulnerability with clear potential for financial or data loss: $500 Other CSRF (excluding logout CSRF): $500 Rules and Guidelines to Report the Vulnerabilities and Get the Reward Taking into account the illegal nature of unauthorized access to the computer systems, we agree not to take legal action against the researchers nor ask law enforcement bodies to investigate the cases of the security breach by the researchers in case they comply with the industry standards and responsible disclosure guidelines described in this section. 1. 1. Main points to receive a reward for detecting vulnerabilities: * ● immediately submit a report to security@binfince.com * ● provide us with enough time to fix the vulnerability/weakness/issue before any information regarding it will become in any manner publicly announced * ● NOT cause any damage to binfince infrastructure and its users * ● NOT mislead users or employees of binfince while detecting vulnerabilities 1. 2. You must be the first to report a vulnerability to receive a reward. 2. 3. In case you find chain vulnerabilities we pay only for vulnerability with the highest severity. 3. 4. You should send a clear textual description of the work done, along with steps to reproduce the vulnerability. 4. 5. Responsible disclosure guidelines: * ● Provide details of the vulnerability, including information needed to reproduce and validate the vulnerability. * ● Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services. * ● Do not modify or access data that does not belong to you. * ● Report the vulnerability as soon as possible. * ● Do not use the detected vulnerabilities for unjust enrichment. If you use the vulnerability in such a way that can cause harm to binfince, our users and third parties and do not report to binfince about the vulnerability, you will not receive a reward and we reserve the right to commence legal action against you. * ● Do not violate any law and stay in the defined scope, and do not participate in any illegal actions (activities). * ● After sending a report, you cannot tell anyone or anywhere about the vulnerability. Public disclosure of a vulnerability makes it ineligible for a reward. Furthermore, you shall not store screenshots and/or executable codes and scripts related to the vulnerability not to make the information available to third parties. Non-security Issues You may let us know about non-security issues at security@binfince.com Write to Support binfince Cryptocurrency Exchange with US MSB Licence About * About Us * Terms of Use * Privacy Policy * KYC & AML * Fees * Bug Bounty Products * Spot Trading * Buy Crypto * Earn * Exchange * Referral Rewards Support * Live Chat Service * FAQ * News Market Tools * Crypto Market Cap * Market Screener * Technical Analysis * Cross Rates * Currency Heat map © 2020-2024 binfince. All rights reserved Deposit Crypto Currency Bitcoin BTC Network BTC Address Currency: BTC Network: BTC Minimum deposit: 0.000001 BTC Expected arrival: 1 network confirmations Send only BTC to this deposit address. Use only the BTC network. If you make a deposit in another currency or network, your assets will be lost. Complete Or Buy with VISA, Mastercard and other methods Buy Crypto 1 Select a currency Bitcoin BTC Network BTC 2 Copy your address Copy 3 Select the Payment methods MoonPay Simplex Banxa Onramp Mercuryo Phemex Sardine Ramp Continue If you were unable to complete the transaction using one of the payment methods, please try another payment method. Withdraw Crypto Currency Bitcoin BTC Network BTC Withdrawal amount BTC MAX Total available: 0 BTC Withdrawal address Network fee 0 BTC Amount received 0 BTC Continue Or Withdraw to Fiat Transfer Account Currency Bitcoin BTC Amount BTC MAX Continue Thanks The operation is unavailable! Support center Promocode Use the promo code to get additional bonuses ActivateDon't show this window 2FA authenticator To withdraw funds, you need to download the 2FA authenticator application Download Exchange From Currency Bitcoin BTC Give BTC MAX Total available: 0 BTC To Currency TetherUS USDT Receive Rate 1 BTC ≈ 71 364.01 USDT Fee 0.0001 % Continue