- Identify Vulnerabilities: Use your skills to find security flaws in any of Devley's products or web dashboard.
- Report Issues: Submit detailed reports of your findings, including steps to reproduce the vulnerability, potential impact, and suggestions for remediation.
- Review and Validate: Our team will review and validate your submission. If the issue is confirmed, you will be eligible for a reward.
- 🎉 Receive Rewards
Rewards are based on the criticality of the vulnerabilities
High to Critical Severity: Public recognition in our Wall of Fame and access to Devley product of your choice.
Low to Medium Criticality: Public recognition in our Wall of Fame.
Only test against systems and products covered by the Bug Bounty Program.
Do not perform any actions that could harm the availability or integrity of our services.
Avoid privacy violations, destruction of data, and disruption of our services.
Provide detailed and actionable reports.
A clear and concise description of the vulnerability.
Detailed steps to reproduce the issue.
Any potential impact and risk assessment.
Suggested remediation or mitigation steps.
- Critical Severity Critical
Vulnerabilities that can be exploited to gain complete control over a system or application, causing severe impact without user interaction.
- High Severity High
Vulnerabilities that can cause significant damage and are easy to exploit, potentially leading to unauthorized access, data breaches, or service disruption.
- Moderate Severity Moderate
Vulnerabilities that require some level of skill or user interaction to exploit and can lead to partial system compromise or information disclosure.
- Low Severity Low
Vulnerabilities that pose minimal risk and are often difficult to exploit, causing minor impact or inconvenience.