Bitcoin Forum
November 13, 2024, 10:12:15 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: ANNOUNCEMENT: PikaPay.com Vulnerability Bounty Program  (Read 587 times)
pikapay (OP)
Full Member
***
Offline Offline

Activity: 164
Merit: 101


@PikaPay - Easy as a Tweet!


View Profile WWW
February 20, 2014, 02:09:26 PM
 #1

Since our last bounty announcement on September 18, 2013, we are pleased to announce that only one actual vulnerability has been reported on PikaPay. We nevertheless want to acknowledge all of the following security investigators who have sent in findings that we found especially interesting and useful. We have paid out rewards for each of these cases because we value the time, attention and insights that these particular contributors have submitted.

PikaPay says thanks for the following:

* The lone XSS vulnerability was discovered by Michael Blake.

* A low-impact _xsrf cookie-related issue involving a web framework we use submitted by a security researcher who has not yet requested acknowledgement. Unless we hear from him we will make a donation on behalf of his security submission to Project Pika.

* A report that certain server header information had been revealed was sent in by Sahil Saif.

* A minor Javascript bug that caused a page to continue loading longer than needed was found by Ben Holden-Crowther.

* The implementation of HSTS headers was suggested by Anand Prakash.

We appreciate the effort these security experts have contributed and thank them for their participation in our vulnerability bounty program.

BitcoinWednesday.com - The monthly conference on the digital currency revolution in The Netherlands.

Every 1st Wednesday of the month in Amsterdam: Meetup.com/BitcoinWednesday

---------------------


- The Easiest Way to Send Bitcoin to Anyone on Twitter
The future of cash has no borders.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!