Finector IT Infrastructure (also referred to as “Finector IT Infrastructure,” “we,” “us,” or “our”) takes steps to improve our product and provide secure solutions for our customers. In this Bug Bounty Policy (“Policy”), we describe applicable cases for our Bug Bounty Program and how it should be used in connection with your use of our website at (https://finector.io/) , including, but not limited to, the Finector Wallet, online Bitcoin trading platform, mobile application, social media pages, or other online properties (collectively, the “Website”), or when you use any of the products, services, content, features, technologies, or functions we offer (collectively, the “Services”). This Policy is designed to help you obtain information about how you can participate in our Bug Bounty Program, which secure research results are applicable, and which benefits you can receive. Please note that our Service offerings may vary by region.
For all purposes, the English language version of this bug bounty policy shall be the original, governing instrument. In the event of any conflict between the English language version of this bug bounty policy and any subsequent translation into any other language, the English language version shall govern and control.
What is the Bug Bounty Program?
In order to improve Finector IT Infrastructure and the Services, the Finector IT Infrastructure Bug Bounty Program provides our users an opportunity to earn a reward for identifying technical issues.
How can you communicate your Bug Bounty Program findings to us?
All such communications should be directed to email@example.com In your submission please specify full description of the vulnerability and verifiable proof that the vulnerability exists (explanation / steps to reproduce / screenshots / videos / scripts or such other materials).
Violation of any of these rules can result in ineligibility for a bounty.
How do we evaluate issues identified under the Bug Bounty Program?
All findings are evaluated using a risk-based approach.
Before we begin discussing any details related to confirmed issues that you have identified under the Bug Bounty Program, including compensation, etc., you will be required to enter into a Non-Disclosure Agreement with us.
How do we pay Bug Bounty Program rewards?
All such rewards are paid by Finector IT Infrastructure. All rewards can be paid only if they are not contrary to applicable laws and regulations, including but not limited to trade sanctions and economic restrictions.
How long will it take us to analyze your Bug Bounty Program findings?
Due to the varying and complex nature of technical issues, we have not established particular timelines for analyzing findings under the Bug Bounty Program. Our analysis is finished only when we have confirmed the existence or absence of a vulnerability.
What cases are excluded from the Bug Bounty Program?
Certain vulnerabilities are considered out-of-scope for the Bug Bounty Program. Those out-of-scope vulnerabilities include, but are not limited to:
If you are looking for more information regarding this Policy, you may contact us by emailing firstname.lastname@example.org.