Devley
Devley Bug Bounty ProgramAt Devley, we prioritize the security and reliability of our products. To ensure the highest standards of quality, we invite security researchers and ethical hackers to participate in our Bug Bounty Program. By identifying and reporting vulnerabilities, you help us maintain a secure environment for all our users. In return, we offer recognition and rewards based on the criticality of the vulnerabilities discovered.
Wall of Fame
Program OverviewOur Bug Bounty Program is designed to reward individuals who discover and report security vulnerabilities in our products and web dashboard. We welcome submissions to any of our products and services.
How It Works
  • Identify Vulnerabilities: Use your skills to find security flaws in any of Devley's products or web dashboard.
  • Report Issues: Submit detailed reports of your findings, including steps to reproduce the vulnerability, potential impact, and suggestions for remediation.
  • Review and Validate: Our team will review and validate your submission. If the issue is confirmed, you will be eligible for a reward.
  • 🎉 Receive Rewards

    Rewards are based on the criticality of the vulnerabilities

    High to Critical Severity: Public recognition in our Wall of Fame and access to Devley product of your choice.

    Low to Medium Criticality: Public recognition in our Wall of Fame.

Eligibility and ScopeTo qualify for the Bug Bounty Program, participants must adhere to the following guidelines:
  • Only test against systems and products covered by the Bug Bounty Program.

  • Do not perform any actions that could harm the availability or integrity of our services.

  • Avoid privacy violations, destruction of data, and disruption of our services.

  • Provide detailed and actionable reports.

Rewards 🎉Participants who successfully identify and report valid security vulnerabilities will receive recognition and rewards based on the severity of the issue. For lower-severity vulnerabilities, you will be honored in our Wall of Fame. For high-severity issues, you will receive both public recognition and access to your chosen Devley product.
Reporting GuidelinesWhen submitting a vulnerability report, please include:
  • A clear and concise description of the vulnerability.

  • Detailed steps to reproduce the issue.

  • Any potential impact and risk assessment.

  • Suggested remediation or mitigation steps.

Vulnerability Severity Levels
  • Critical Severity Critical

    Vulnerabilities that can be exploited to gain complete control over a system or application, causing severe impact without user interaction.

  • High Severity High

    Vulnerabilities that can cause significant damage and are easy to exploit, potentially leading to unauthorized access, data breaches, or service disruption.

  • Moderate Severity Moderate

    Vulnerabilities that require some level of skill or user interaction to exploit and can lead to partial system compromise or information disclosure.

  • Low Severity Low

    Vulnerabilities that pose minimal risk and are often difficult to exploit, causing minor impact or inconvenience.

Contact UsIf you are ready to participate in our Bug Bounty Program or have any questions, please reach out to our security team at yuv.the.dev@gmail.com. We appreciate your contributions and look forward to collaborating with you to enhance the security of our products.