At Licious, we value the contributions of security researchers in enhancing our security. Here's how our reward system works:
✅ Eligibility & Reward Criteria
First Reporter: Only the first valid report of a vulnerability is eligible for a reward.
Scope Compliance: The vulnerability must fall within our defined scope and adhere to our responsible disclosure guidelines.
Evaluation Factors: Rewards are determined based on:
- Severity of the issue
- Likelihood of exploitation
- Ease of exploitation
- Quality of the report, including clarity, reproducibility, and supporting evidence.
💰 Reward Process
- Report Submission: Submit your findings through our designated reporting channels.
- Analysis & Validation: Our security team will review and validate the reported vulnerability.
- Reward Determination: Upon validation, we will assess the reward based on the criteria mentioned above
Minimum Reward
We value the contributions of security researchers in helping us maintain a secure environment. All valid submissions will be reviewed by our internal team. Based on the severity, impact, and quality of the report, rewards will be determined in accordance with our internal evaluation process.
✅ Do's: Best Practices for Effective Reporting
To help us understand and address vulnerabilities efficiently, please follow these guidelines:
- Review the Scope: Ensure the issue you're reporting falls within the defined scope of our program. This helps in prioritizing and validating your submission.
- Provide a Clear Proof of Concept (PoC): Include detailed steps to reproduce the issue, along with screenshots or a video PoC when applicable. This enables our team to verify and validate the vulnerability without needing follow-up questions.
- Assess and Communicate the Security Impact:Clearly describe the potential consequences of the vulnerability. Our bounty payouts are directly tied to security impact, so the more detail you can provide, the better.
- Submit Detailed Reports Even When Unsure:If you're uncertain about the direct impact but believe you've found something interesting, feel free to submit a detailed report and ask.
❌ Don's: Actions to Avoid
To maintain the integrity of our program and ensure a safe and secure environment, please refrain from the following:
- Unauthorized Access: Do not use or interact with accounts you do not own.
- Brute Force Attacks: Do not brute force credentials or guess credentials to gain access to systems or accounts.
- Changing Unauthorized Passwords: Do not change passwords of any account that is not yours or that you do not have explicit permission to change.
- Denial of Service (DoS) Attacks: Do not perform DoS attacks or related tests that would cause availability interruptions or degradation of our services.
- Premature Disclosure: Do not disclose a vulnerability submission, as our bug bounty program prohibits both public and private disclosures.
- Social Engineering: Do not engage in any form of social engineering of our employees, customers, or partners.
- Targeting Individuals: Do not engage or target any specific employees, customers, or partners during your testing.
- Accessing Sensitive Data: Do not access, extract, or download personal or business information beyond that which is minimally necessary for your PoC purposes.
- Data Destruction: Do not do anything that would cause destruction of our data or systems.
- Privacy Violations: Respect user privacy and confidentiality; refrain from accessing or tampering with sensitive data.
- Legal Compliance: Comply with all applicable laws and regulations during the research process.
Out-Of-Scope
1. Web applications and APIs
- a. Host header injection without proven business impact
- b. API key disclosure without proven business impact
- c. Blind SSRF without proven business impact (pingbacks are not sufficient)
- d. HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- e. Fingerprinting/banner disclosure on common/public services.
- f. Disclosure of known public files or directories (e.g., robots.txt).
- g. Getting OTPs is expected behaviour for countries other than India.
- h. Issues that require non-simple user interaction, such as Self-XSS, clickjacking, that require the victim to install a certain application and interact with it, and issues that require MITM or access to physical devices.
- i. Clickjacking on pages with no sensitive actions.
- j. CSRF on forms that are available to anonymous users (e.g., login or contact form).
- k. Logout / Login Cross-Site Request Forgery (logout CSRF).
- l. Presence of application or web browser 'autocomplete' or 'save password' functionality.
- m. Lack of Security Speed Bump when leaving the site.
- n. No Captcha / Weak Captcha / Captcha Bypass.
- o. Login or Forgot Password page brute force and account lockout not enforced.
- p. HTTP method enabled OPTIONS, PUT, GET, DELETE, INFO.
- q. WebServer Type disclosures.
- r. Social engineering of our service desk, employees, or contractors.
- s. Physical attacks against Licious's offices and data centers.
- t. Error messages with non-sensitive data.
- u. Non-application layer Denial of Service or DDoS.
- v. Lack of HTTP Only / SECURE flag for cookies.
- w. Username / email enumeration: via Login Page error message | via Forgot Password error message.
- x. Missing HTTP security headers.
- y. CSV Issues.
- z. AV Scanning.
- aa. SSL Issues.
- ab. Cookie Issues:
- HTTPONLY
- SECURE
- Multiple cookie setting
- Anything to do with JSESSIONID
- ac. Service Rate Limiting.
- ad. User or Org enumeration.
- ae. Security Image Issues.
- af. Homograph attacks.
2. For Mobile Applications
- a. Crashes due to malformed URL Schemes.
- b. Shared links leaked through the system clipboard.
- c. No or ineffective jailbreak / root detection.
- d. Snapshot/Pasteboard leakage.
- e. Sensitive data in URLs/request bodies when protected by TLS.
- f. No or ineffective anti-reversing controls (e.g. obfuscation, runtime tampering, debugging, emulator detection).
- g. No or ineffective certificate validation and pinning.
- h. Disclosure of paths in binary (such as file system paths of the system where the app was compiled).
- i. Disclosure of API keys for non-sensitive uses.
- j. Runtime hacking exploits that are only possible on jailbroken or rooted end-user devices.