BUG BOUNTY PROGRAM

Last updated on April 4, 2024

Welcome to AiNET‘s Bug Bounty Program!

It is an undeniable fact that even the most brilliant minds can overlook a tiny bug or two- which is why we’re inviting you to join our quest for squashing bugs and making our solutions the best they can be.

We know that the tiniest glitches can cause the largest headaches, so we’re counting on your sharp eyes and keen instincts to help us track them down.

Program Details:

Our bug bounty program is a testament to our belief in the strength of community collaboration.

Rewards:

Apart from the warm feeling of contributing to a more secure internet, we’re offering some exciting rewards to our bug bounty hunters. If you manage to uncover a genuine bug, you could be eligible for the following:

  • A shiny spot on our prestigious Hall of Fame, where your name will forever be etched as a hero who helped fortify our defenses.
  • A generous cash reward because we know that great bug hunters deserve great compensation. The bounty amount will depend on the severity and impact of the bug you uncover. We believe in fair play and will evaluate each report with meticulous attention.
  • Swag galore! Expect some cool merchandise, including limited edition t-shirts, stickers, and even a customized bug-shaped stress ball to squeeze away the frustrations of your hacking endeavors.

Who Can Hunt?

We encourage all developers, security enthusiasts, hackers with a heart of gold, and tech sleuths to put their skills to the test and help us build a bulletproof cloud fortress. Go above and beyond to help us spot vulnerabilities, security loopholes, or pesky bugs hiding in the darkest corners of our code.

Hunting Process:

To aid you in your quest, here are some tips from our battle-hardened developers:

  • Thoroughly explore all nooks and crannies: Bugs are notorious for hiding in the most unexpected places. Navigate through every feature, click every button, and tinker with all the settings. Leave no stone unturned in your quest for perfection.
  • Think like a bug: Channel your inner insect. Imagine you are a devious little critter trying to wreak havoc within our code. Where would you strike? What vulnerabilities would you exploit? By adopting this unique perspective, you can outsmart even the trickiest of bugs.
  • Communicate with empathy: Bugs are notorious for their sensitivity. When you encounter one, approach it with empathy and understanding. Coax it gently by providing clear and concise steps to reproduce the issue. Remember, bugs respond well to patience and a soothing tone of voice.
  • Celebrate the weird and the wonderful: Sometimes, the most valuable bug reports come from the oddest encounters. So, don’t shy away from the peculiar or the unconventional. Embrace the weirdness and submit your findings, no matter how extraordinary they may seem.
  • Document your triumphs: Each bug vanquished is a victory worth celebrating. Keep a journal of your conquests, noting the ingenious solutions you discover along the way. Share your tales of bug-slaying valor with fellow hunters, and let the world marvel at your expertise.

Reporting Process:

  • Get acquainted with our website: Familiarize yourself with our website, explore its nooks and crannies, and interact with its intricate features. The more you uncover, the better your chances of discovering something remarkable.
  • Identify bugs, don’t create them: We’re searching for those elusive little creatures that slip through the cracks, not the ones that wreak havoc. Please play by the rules, as any attempts to compromise user data or system integrity will be frowned upon (and likely met with a stern look from our team).
  • Report your findings: When you stumble upon a bug, a vulnerability, or an unintended feature, don your detective hat and let us know! Send a detailed report to our Bug Bounty team at support@ai.net including step-by-step instructions to reproduce the issue and any additional supporting evidence.
  • Our superheroes in action: Once we receive your report, our security experts will swing into action faster than a superhero chasing a supervillain. They’ll evaluate your findings, triage the severity, and get to work on implementing the necessary fixes.
  • Rewarding the vigilant: Ah, the moment you’ve been waiting for! If your report hits the bullseye, you’ll be handsomely rewarded for your efforts. The rewards will vary based on the severity and impact of the bug, but rest assured, we’ve prepared a treasure chest of bountiful goodies just for you.

Vulnerability Disclosure Guidelines:

  • Respect user privacy: Please refrain from accessing, tampering with, or sharing any sensitive user data during your bug-hunting escapades. We take privacy seriously, and so should you.
  • Don’t be a stealthy ninja: We appreciate your vigilance, but we kindly request that you avoid compromising the availability, integrity, or performance of our systems. Let’s keep everything up and running smoothly.
  • Respect the law of the digital realm: Engaging in malicious activities, attempting to exploit our infrastructure, or launching denial-of-service attacks will have consequences we’d rather avoid. Let’s keep it clean, folks.
  • One vulnerability at a time: While we applaud your enthusiasm, please focus on one vulnerability per report. It helps us streamline the process and ensure that each issue receives the attention it deserves.

Responsible Disclosure:

  • Adhere to The Program Guidelines: By participating in our Bug Bounty Program, you agree to adhere to the program’s rules and guidelines.
  • We Reserve all Rights: We will make every effort to acknowledge and reward your contribution promptly, but please understand that eligibility for rewards is at our discretion. We may also modify the program’s terms and conditions as necessary, but we promise to keep you informed about any updates.

Now that you’re armed with all the information you need, it’s time to put your skills to the test. We eagerly await your reports, marvel at your expertise, and appreciate your dedication to making our solutions as secure as Fort Knox.

May your code always compile and your bug reports be legendary!

AiNET Bug Bounty Team