Bitpanda GmbH (Bitpanda) Bitpanda.com as Europe's leading retail exchange for buying and selling cryptocurrencies has made every effort to secure its platform and mobile applications and to eliminate all software vulnerabilities in its systems. As part of Bitpanda's security guidelines we appreciate your cooperation in investigating and reporting any vulnerabilities of the Bitpanda Services (as defined below).
This Bug Bounty Programme gives you the framework on how to act as a security researcher and be rewarded for finding and reporting bugs within the Bitpanda ecosystem (Bitpanda Bug Bounty Programme or Programme).
This section will give you an overview of the Bitpanda Bug Bounty Programme. Please make sure you keep the ruleset in mind before investigating any issues. Bitpanda offers rewards for significant bugs pursuant to this Programme.
Bitpanda reserves the right to modify or cancel the Bitpanda Bug Programme at Bitpanda's sole discretion and at any time.
Every person participating in the Bitpanda Bug Bounty Programme is called a “Security Researcher”. To be classified as a Security Researcher you must fully comply with this Programme. Only fully compliant “Security Researchers” may get rewards according to this Programme.
The Bitpanda Bug Bounty Programme's scope covers software vulnerabilities in services by Bitpanda. Bitpanda services and their specific domains are (Bitpanda Services):
Service | Domain |
---|---|
Bitpanda | https://www.bitpanda.com |
Bitpanda Platform | https://web.bitpanda.com |
Bitpanda Platform API | http://api.bitpanda/v1 |
Bitpanda Socket | wss://socket.bitpanda.com |
Bitpanda Pro | https://exchange.bitpanda.com |
Bitpanda Pro API | https://api.exchange.bitpanda.com/public/v1 |
Bitpanda Pro Secure Web Sockets | wss://streams.exchange.bitpanda.com |
Android App | https://play.google.com/store/apps/details?id=com.bitpanda.bitpanda |
iOS App | https://apps.apple.com/app/bitpanda-buy-bitcoin-crypto/id1449018960 |
Not part of the Bitpanda Bug Bounty Programme and explicitly out of the Programme's scope are following subdomains, hosted by third parties (Non-Bitpanda Services).
Service | Domain |
---|---|
Bitpanda Blog | https://blog.bitpanda.com |
Bitpanda Magazine | https://magazine.bitpanda.com |
Bitpanda Helpdesk | https://support.bitpanda.com |
Non-Bitpanda Services may be eligible for a bug report, if such vulnerability directly leads to a relevant impact on a Bitpanda Service.
Additionally, all kind of other websites, software, applications etc. are explicitly out of the Programme's scope, in particular:
No exception is existent for external websites.
A Bug report is a summary of your findings concerning a detected vulnerability of Bitpanda Services. In general, a bug report must be valid, in scope report to qualify as a bug report and, hence, to qualify for a reward. Please find the requirements for a compliant bug report under point "Complete Bug Report".
A Security Researcher reporting an issue first is called the First Reporter. Rewards for a specific vulnerability go to the First Reporter. A subsequent bug report reporting the same or similar vulnerability will not be eligible for a reward (first come first serve principle). Provided that Bitpanda is already aware of a specific vulnerability at the time of a submitted bug report reporting the same or similar vulnerability as already known, Bitpanda is deemed to be the First Reporter.
Bitpanda grants rewards (also called bounty and/or bounties) for reporting software vulnerabilities in accordance with this Programme. Rewards may be granted if the following requirements called the “Researcher Requirements” are collectively fulfilled:
If just one of the above requirements is not fulfilled, this has to be assessed as a non-compliance with this Programme.
Bitpanda decides at its sole and own discretion whether a reward is granted and the exact amount of such bounty. A granted reward will be paid to the Bitpanda fiat wallet (EUR) in the Bitpanda user account of the respective successful First Reporter. This means that a First Reporter requires a user account on the Bitpanda platform for receiving the reward. If a Security Researcher that is qualified as a respective First Reporter is not able to set up a user account on the Bitpanda platform (e.g. Security Researcher holds citizenship of or is located in jurisdiction that is excluded from Bitpanda’s services due to regulatory reasons, AML/KYC considerations, etc), Bitpanda may, at its own discretion - and out of pure good will - arrange another form of granting the Reward to the successful First Reporter. Security Reporter acknowledges and accepts, that he has no legal claim against Bitpanda for payment of any Reward in case he is not able to set up a user account on the Bitpanda platform.
Every investigation must be done responsibly. Responsible investigation includes, but is not limited to:
Any non-responsible investigation action will result in an exclusion of the Bitpanda Bug Bounty Programme.
Bitpanda needs documentation of the existing vulnerability. This is called a bug report. Bitpanda can only accept complete bug reports, after sending it to https://support.bitpanda.com/hc/en-us/requests/new?vulnerability=1.
A bug report is complete, if Bitpanda can reproduce the bug and can assess the potential impact.
How can I make sure it is complete?
In general, every bug in a Bitpanda Service leading to a relevant vulnerability could be eligible for a reward. The focus lies on:
In the following you find some examples for security issues which may be eligible for a reward in accordance with this Programme:
All vulnerabilities of Bitpanda Services that require or are related to the following are not eligible for a bug report and/or reward and called ineligible vulnerabilities. Such ineligible vulnerabilities are in particular:
Security Researchers must adhere to and follow the principles of “Responsible Disclosure” as outlined in the following. Responsible disclosure rules are:
Any breaking or neglection of these rules will be a violation of the Bitpanda Bug Bounty Programme.
The reward that can be expected for your bug report depends on the severity of the reported vulnerability. The table below will give you a general guideline what you can expect for your investigation efforts:
Vulnerability | Reward in EUR (net) |
---|---|
Critical | min. 50,000.00 dependent on severeness of vulnerability |
High | 5,000.00 |
Medium | 1,000.00 |
Low | 500.00 |
The above mentioned amounts are minimum bounties for each level of vulnerability. A concrete bounty may excess the minimum amount based on the severity of the vulnerability and/or the Security Researcher's technique and reporting quality. The granted reward will be determined by the impact on the Bitpanda Service.
Previous granted bounty amounts are not considered precedent for future bounty amounts.
The evaluation of your complete bug report will be done solely by Bitpanda. As mentioned the 4 researcher parameters stated out in point "Rewards" must be fulfilled to be evaluated as a valid bug report. The impact of the found vulnerability will determine the reward as described in point "Rewards Structure. The reported bug or vulnerability will be evaluated based on two factors: Impact and Exploitability.
To give you an idea, how this works we provide you with some easy examples.
Impact in general means the damage an abuser can cause. This refers but is not limited to financial damages, functional damages, exploitation on confidentiality, integrity and availability of sensitive information & damages which could result in reputational damages.
The scope of evaluation concerning the impact ranges from low to critical.
Critical:
Low:
Exploitability refers to the difficulty the system can be “gamed” or security measures can be bypassed.
Critical:
Low:
Please note that all these examples refer to unauthorized actions and not the normal intended functions (e.g. data export, normal trading function) by Bitpanda.
Severity is used for calculating the reward and is a combination of impact and exploitability.
The formula can be seen as:
Impact (Damage) * Exploitability (How easy is it to repeat the damage) = Vulnerability Tier
Critical:
Low: