AliumSwap
  • About AliumSwap
    • Official Channels
    • Roadmap
  • Bug Bounty Program
  • Products
    • AMM Multi-chain DEX
      • Hybrid Liquidity
      • Liquidity Migration
      • On-Ramp & Off-Ramp Features
    • Alium Green Button
    • Strong Holders' Pool
    • ALM Token
  • Guides
    • How to Set Up a Wallet
      • Metamask
      • Trust Wallet
      • OKX Wallet
      • ONTO Wallet
    • How to Trade on AliumSwap
      • How to Use a Cross-chain Feature
      • How to Use Refunding Feature
      • How to Provide Liquidity
      • How to Migrate Liquidity
      • How to Use On-Ramp & Off-Ramp
    • How to Use AGB
    • How to Farm
  • Investors, Partners & Advisors
    • Investors
    • Partners
    • Advisors
  • Token Distribution
    • Tokenomics
    • Private Sale
    • Public Sale
  • Security Audits
    • CertiK
      • Security Assessment Alium Farm by CertiK May 15th, 2021
      • Security Assessment Alium Collectible by CertiK May 8th, 2021
      • Alium Router Security Assessment by CertiK
    • Quillhash
      • Alium Router smart contract audit by Quillhash
      • Multicall User Executable Audit Report by Quillhash
    • Hacken
      • Smart Contract Code Review and Security Analysis Report by Hacken, May 12th, 2021
    • Chainsulting
      • Core DEX Сontracts Audits by Chainsulting
      • Private round Smart Contract Audit by Chainsulting
  • Legal
    • Terms of Services
    • Privacy Policy
  • Media
    • Press Releases
Powered by GitBook
On this page

Was this helpful?

Bug Bounty Program

AliumSwap team needs you! As part of our ongoing effort to keep your tokens safe and make it easier to work with our Ecosystem, we run a Bug Bounty Program

If you discover an issue in our system, we'd like to work with you to fix it and reward you for your assistance. Join our new Bug Bounty program, and help us make our project even better!

To participate please follow the rules.

Bug bounty rules:

  • Do not attempt non-technical reports (Social, Design e.t.c)

  • Make a good faith effort to avoid privacy violations, destruction of data, interruption or degradation of our businesses, including Denial of Services attacks.

  • Not exploit the vulnerability in any way, including through making it public or by obtaining a profit (other than a reward under this Program).

  • Do not attempt non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.

  • Submit only one vulnerability per submission, unless you need to chain vulnerabilities to provide impact regarding any of the vulnerabilities.

  • In case we receive duplicate reports of a specific vulnerability, only the first report is eligible for a reward.

  • By submitting a bug, you agree to be bound by the rules.

  • All bug reports must include a Proof of Concept demonstrating how the vulnerability can be exploited to be eligible for a reward. This may be a smart contract itself or a transaction.

*We will do our best to keep you informed about our progress throughout the process

Rewards are to be discussed personally depending on the bug criticalness.

Have no doubts - your work will be rewarded generously.

PreviousRoadmapNextAMM Multi-chain DEX

Last updated 2 years ago

Was this helpful?