We use cookies to enhance your browsing experience and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.. View our Privacy Policy for more information.
Your browser (Internet Explorer) is out of date. Please download one of these up-to-date, free and excellent browsers:
For more security speed and comfort.
The download is safe from the vendor's official website.

Blog:

Announcing the BugBounty program

HUMAN Blog
Fundamentals
HUMAN Protocol
Sep 28, 2021

Announcing the BugBounty program

2 min read

HUMAN Protocol is inviting ethical hackers to find (and fix) bugs! Hackers will be asked to “attack” our website.

Why?

We want to protect our HUMANs. 

We are dedicated to protecting the privacy of users on both ends of the system - both Requesters and Workers - while ensuring that the Protocol is robust enough to manage the launch, distribution, fulfilment, evaluation, and payment of work. With the potential to revolutionize the way we work, and catalyze a new generation of AI products, it is essential to make HUMAN Protocol as safe, reliable, and trustworthy as possible. 

Applications that run on HUMAN Protocol are already used by many millions of users every month. We want to make sure that the work which moves onto the Protocol is managed in a safe, secure manner. 

How it works

Once a vulnerability is found, reproduced, and altogether in accordance with our policy, we will provide an estimate of the financial compensation, a payment timeline, a request for payment information, and a public disclosure timeline for you. Here’s an estimate of the reward structure:

Note: the higher rewards will be given on the condition that the vulnerability can be reproduced, and has a significant system impact.

Get started

For security researchers, please visit our GitHub to see the clear guidelines on conducting vulnerability discovery activities. On this page you will also find useful information on:

  • What systems and types of research we support under the BugBounty policy.
  • How to send us vulnerability reports. You can access this typeform here.
  • The length of time security researchers must wait before publicly disclosing vulnerabilities.

Please note that in order to partake formally in the BugBounty program - and to have any chance of being paid for your work - you must comply with our policy guidelines. 

For the latest updates on HUMAN Protocol, follow us on Twitter or join our Discord. Alternatively, to enquire about integrations, usage, or to learn more about how HUMAN Protocol supports machine-learning technologies, get in contact with the HUMAN team.

Legal Disclaimer

The HUMAN Protocol Foundation makes no representation, warranty, or undertaking, express or implied, as to the accuracy, reliability, completeness, or reasonableness of the information contained here. Any assumptions, opinions, and estimations expressed constitute the HUMAN Protocol Foundation’s judgment as of the time of publishing and are subject to change without notice. Any projection contained within the information presented here is based on a number of assumptions, and there can be no guarantee that any projected outcomes will be achieved.

Guest post