BUG BOUNTY PROGRAM
Help us secure our platform by identifying vulnerabilities and earn rewards.
About the Program
We reward ethical hackers for reporting security vulnerabilities. Learn more about our program.
How It Works
- π Find security vulnerabilities.
- π© Report securely to our team.
- π Receive rewards & recognition.
Rules & Confidentiality
- π« No public disclosure before reporting.
- π Submit detailed Proof of Concept.
- β οΈ Avoid social engineering & illegal activities.
Bug Bounty Rules
While the core bug bounty principles remain the same, additional considerations apply to the BLOKC Protocol:
- β Invalid vulnerabilities include known issues, DAO-accepted risks, and non-impactful findings..
- π Reports must include full technical details, steps to reproduce, and impact assessment.
- π Denial of Service, phishing, or unauthorized data access attempts are strictly prohibited.
- π All reported vulnerabilities must pertain directly to the Interface, BLOKC Protocol components and infrastructure.
- π° Payments are made directly to your Garden.
- π Confidentiality is crucialβdo not share discovered vulnerabilities publicly before resolution.
Coming Soon
Our bug bounty program is launching soon. Stay tuned!
Frequently Asked Questions
Explore our most common questions and their answers. Need further assistance? Feel free to contact us directly.
Join Our Revolution
Be part of the future of decentralized finance and join our growing community of investors and enthusiasts.
FOLLOW US
CHAT WITH US
Dedicated Telegram Moderators
Instant Community Engagement
Global Community Network