At we believe in the power of crowd wisdom. As we are looking to continuously improve our platform to make it more secure and easy to use for our traders, we’ve launched a bug-bounty program. If you find any bugs on our platform or have feedback on how we can further improve our service, please kindly reach out.

The bounties we offer range from 0.0025 BTC to 0.25 BTC for confirmed bug reports. We will rate each submission and pay out the bounty in accordance with our vulnerability rating. As you can imagine, some bugs are more significant than others. All payouts are defined in our guidelines and subject to change. We process all payouts in BTC to ensure you receive your well-deserved bounty fast.

  • You’ll be immediately disqualified when asking for payment in exchange for vulnerability details. Please make sure that any report submitted includes a clear and detailed description of the vulnerability. Please also include detailed instructions on how to reproduce your findings.
  • Unfortunately, when we cannot reproduce your findings, your report will not be eligible for payout. Therefore, please make sure that you describe how you found the bug and how we can reproduce it in as much detail as possible.
  • All our reward payments are made in Bitcoin (BTC) directly to your account.
  • Please submit any bug reports to [email protected].
  • We will check your report within 4 weeks after it’s submission.
  • Our minimum payout for a bug report is 0.0025 BTC. Bug-Bounty Program Statistics

(Please note that this data is updated every month)

  • 1 report was reviewed and reward in the last quarter
  • 5 days is the average vulnerability review period in the last quarter
  • $100 in BTC average payout in the last quarter

Wall of Fame

(Please note that this data is updated every month)

Name Reward
Mr. Anonymous
(This researcher kindly asked us to remain anonymous)
$100 in BTC

In-Scope Properties

The following properties are in scope for the bug bounty program of All rewards will be issued in Bitcoin.

  • wss://

Out of Scope Properties

Please note that the following properties are out of scope for bug bounty rewards:

  • Any other properties that aren’t included in the in-scope properties above.

Additionally, all other 3rd party hosted assets that are not explicitly mentioned in our “In Scope Properties” don’t fall under our Bug Bounty program either. Check In Scope Properties for an overview of included properties.

Out of Scope Vulnerabilities

  • Low version browsers, platforms, etc
  • Lack of Secure and HttpOnly cookie flags
  • OPTIONS/TRACE HTTP method enabled
  • Clickjacking/Tapjacking
  • Physical attacks against and Social engineering attacks against employees
  • Cross-Site Request Forgery attacks
  • Descriptive error messages
  • Content Spoofing without embedded links/HTML
  • Theoretical risk vulnerabilities
  • Self-XSS
  • Vulnerabilities in 3rd party applications
  • Weak Captcha/Captcha Bypass
  • Some functions are BUG, ​​which cannot cause security risks
  • Spam (SMS, email, etc)
  • NGINX and/or other middleware leaks
  • Publicly login panels
  • Interface brute force blasting of registered user name vulnerabilities
  • Mixed HTTP Content
  • Recently (less than 30 days) disclosed 0day vulnerabilities
  • Issues related to best practices
  • Man-in-the-middle and local attacks
  • Missing HTTP security headers
  • Cross-Site Request Forgery in forms that are available to anonymous and unregistered users
  • Email enumeration via Login/Forgot Password and other pages error messages
  • Login & Logout Cross-Site Request Forgery
  • HTML injection
  • Certificate/TLS/SSL related vulnerabilities
  • Manipulation with Password Reset/Withdrawal confirmation/2FA activation or any other tokens
  • Any Distributed-Denial-of-Service/Denial-of-Service issues
  • Content Security Policy
  • Any HTTPS content scripts Bug Bounty Program Rules and Policy

  1. (FMFW Ltd.) agrees to refrain from initiating legal action against any security research performed that complies with the program rules of the Exchange Bug Bounty program. This includes good faith and violations that are non-deliberate. All activities that fall under “authorized” conduct as specified under the DMCA, the CFAA, the Computer Misuse Act, and other hacking laws such as Cal. Penal Code 503(c) we won’t bring legal claims against the individual or institution who circumvented security measures to contribute to the bug bounty program and the continuous improvement of our platform.
  2. Don’t access or modify other users' data. Keep all your tests limited to your accounts. If you fail to comply, it will entail a lawsuit against you.
  3. If we receive several reports on the same vulnerability, only the first received report will be eligible for a reward.
  4. Please refrain from exploiting the vulnerability neither by making it public nor by enriching yourself. Failure to comply will result in legal action against you.
  5. Don’t break any laws and limit yourself to the defined scope. Failure to comply will result in legal action.
  6. Please refrain from publicly disclosing any vulnerabilities without our consent. We will only approve Public Disclosure requests once the vulnerability has been resolved.
  7. Please limit yourself to submitting one vulnerability at a time. If you deem it necessary to chain vulnerabilities to illustrate the impact, you can submit more than one.
  8. Please ensure not to hinder the availability or level of service of our exchange when conducting your testing.
  9. Please ensure that you’re not compromising personal data, and do not interrupt or degrade our service. Failure to comply will result in legal action.
  10. Refrain from spam bots to spam our sign-up form or automated scanners to interrupt our account creation flow.
  11. Please don’t use any applications that scan automatically for vulnerabilities by generating massive traffic.
  12. Don’t launch any Distributed-Denial-of-Service/Denial-of-Service attacks, social engineering attacks, or any form of spam; otherwise, it will entail a lawsuit against you.
  13. Please don’t share details on any vulnerabilities you discovered with anyone outside the team without explicit permission given by us.
  14. The reserves the right to cancel or amend these terms or conditions without prior notification. All the terms and conditions applicable to usage of also apply to this Bug Bounty Program.
  15. By submitting a report, you agree to be bound and comply with the rules outlined here.
  16. By submitting a report, you acknowledge and agree to the rules outlined in the program. You also agree that any decision taken by is final and binding.

Last update