Effective As Of: May 20th, 2021
SuperRare believes in strengthening relationships with security researchers and encouraging a community-led, decentralized approach to our platform's security. We encourage people who discover potential security vulnerabilities to participate in our Bug Bounty Program by promptly disclosing potential vulnerabilities to us in exchange for a possible award.
<aside> ⚠️ Please review these Bug Bounty Program Terms before submitting a report. By submitting your report, you expressly agree to the terms of this Bug Bounty Program, which SuperRare may modify and implement in its sole discretion. We may ignore any received reports that do not strictly comply with the requirements of these terms at our sole discretion. There is no guarantee that you will receive a response within any particular period of time.
</aside>
If you have information about a security issue or vulnerability with the SuperRare website or public smart contracts and wish to participate in our Bug Bounty Program, please send an encrypted e-mail report to **[email protected].** Eligible reports must provide as much information as possible and must strictly comply with the requirements below.
To be eligible for bounty award consideration, your report must meet the following basic requirements:
The Report must relate to the SuperRare Protocol smart contracts or SuperRare.com (excluding wordpress, discourse, or other third-party dependent bugs)
The Report and any accompanying material or information sent to SuperRare must be encrypted with the SuperRare public key You must send a public pgp key to SuperRare in your Report in order to receive a response. Click here for instructions on how to send us with our encryption key.
The vulnerability you identify must be original, not previously known to SuperRare, not previously reported to SuperRare, and not otherwise publicly disclosed.
The Report must show that the potential vulnerability has been demonstrated against the most recent publicly available version of the affected technology.
The Report must contain a detailed explanation of the reported vulnerability, how it can be exploited, the impact of the vulnerability being successfully exploited and likelihood of a successful exploit.
The Report must contain a Proof of Concept (POC): code or instructions that clearly demonstrate the vulnerability and allows SuperRare to reproduce the exploit, including any necessary tooling, version identifiers, operating system(s)/version(s), or other information as is required to setup an environment and reproduce the issue.
For vulnerabilities involving personally identifiable information (PII), please explain the type of PII you believe is exposed and limit the amount of PII data included in your submissions.
The email address you submit reports with and that we respond to must match the email identity associated with your pgp key
The following are general categories of vulnerabilities that are considered ineligible for a bounty award: