[bisq-contrib] I found Security Vulnerability in your web application
Manfred Karrer
mk at nucleo.io
Sat Feb 23 20:22:27 UTC 2019
Hallo,
thanks for reaching out.
We don’t have a bug bounty set up yet.
Can you send us some references where you found a vulnerability in the past?
We receive plenty of such emails and usually they are automated scripts running over 10000s of webpages and point out irrelevant issues.
If you have found a relevant issue though we are willing to compensate you for your finding but we need more specific information.
Br,
Manfred
> On 17 Feb 2019, at 15:58, Peter hooks <peterhooks007 at gmail.com> wrote:
>
>
>
>
> --
>
> Hey,
> I found Security Vulnerability in your web application, which can damage site as well as users too. For security purpose can we report vulnerability here, then will I get bounty reward in PayPal for Security bug?
>
> Thanks,
> Peter Hooks
> Independent Security Researcher
>
> _______________________________________________
> bisq-contrib mailing list
> bisq-contrib at lists.bisq.network
> https://lists.bisq.network/listinfo/bisq-contrib
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.bisq.network/pipermail/bisq-contrib/attachments/20190223/7a9c85d1/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.bisq.network/pipermail/bisq-contrib/attachments/20190223/7a9c85d1/attachment.sig>
More information about the bisq-contrib
mailing list