BUG BOUNTY PROGRAM

Help us secure our platform by identifying vulnerabilities and earn rewards.

About the Program

We reward ethical hackers for reporting security vulnerabilities. Learn more about our program.

How It Works

  1. πŸ” Find security vulnerabilities.
  2. πŸ“© Report securely to our team.
  3. πŸ† Receive rewards & recognition.

Rules & Confidentiality

  • 🚫 No public disclosure before reporting.
  • πŸ“ Submit detailed Proof of Concept.
  • ⚠️ Avoid social engineering & illegal activities.

Bug Bounty Rules

While the core bug bounty principles remain the same, additional considerations apply to the BLOKC Protocol:

  • ❌ Invalid vulnerabilities include known issues, DAO-accepted risks, and non-impactful findings..
  • πŸ“Œ Reports must include full technical details, steps to reproduce, and impact assessment.
  • πŸ›‘ Denial of Service, phishing, or unauthorized data access attempts are strictly prohibited.
  • πŸ“œ All reported vulnerabilities must pertain directly to the Interface, BLOKC Protocol components and infrastructure.
  • πŸ’° Payments are made directly to your Garden.
  • πŸ” Confidentiality is crucialβ€”do not share discovered vulnerabilities publicly before resolution.

Coming Soon

Our bug bounty program is launching soon. Stay tuned!

Frequently Asked Questions

Explore our most common questions and their answers. Need further assistance? Feel free to contact us directly.

Join Our Revolution

Be part of the future of decentralized finance and join our growing community of investors and enthusiasts.

FOLLOW US

Join our vibrant community and be at the forefront of the DAOs Revolution. Connect, collaborate, and grow together.

CHAT WITH US

Dedicated Telegram Moderators

Instant Community Engagement

Global Community Network