HUMAN Protocol is inviting ethical hackers to find (and fix) bugs! Hackers will be asked to “attack” our website.
We want to protect our HUMANs.
We are dedicated to protecting the privacy of users on both ends of the system - both Requesters and Workers - while ensuring that the Protocol is robust enough to manage the launch, distribution, fulfilment, evaluation, and payment of work. With the potential to revolutionize the way we work, and catalyze a new generation of AI products, it is essential to make HUMAN Protocol as safe, reliable, and trustworthy as possible.
Applications that run on HUMAN Protocol are already used by many millions of users every month. We want to make sure that the work which moves onto the Protocol is managed in a safe, secure manner.
Once a vulnerability is found, reproduced, and altogether in accordance with our policy, we will provide an estimate of the financial compensation, a payment timeline, a request for payment information, and a public disclosure timeline for you. Here’s an estimate of the reward structure:
For security researchers, please visit our GitHub to see the clear guidelines on conducting vulnerability discovery activities. On this page you will also find useful information on:
Please note that in order to partake formally in the BugBounty program - and to have any chance of being paid for your work - you must comply with our policy guidelines.
For the latest updates on HUMAN Protocol, follow us on Twitter or join our Discord. Alternatively, to enquire about integrations, usage, or to learn more about how HUMAN Protocol supports machine-learning technologies, get in contact with the HUMAN team.
The HUMAN Protocol Foundation makes no representation, warranty, or undertaking, express or implied, as to the accuracy, reliability, completeness, or reasonableness of the information contained here. Any assumptions, opinions, and estimations expressed constitute the HUMAN Protocol Foundation’s judgment as of the time of publishing and are subject to change without notice. Any projection contained within the information presented here is based on a number of assumptions, and there can be no guarantee that any projected outcomes will be achieved.