Buy Crypto
Assets
On Monday 18th December, 14:00 GMT, Atomic Wallet, a leading innovator in the decentralized wallet space, launched a Bug Bounty Program with a staggering USD 1,000,000 prize pool.
The initiative invites security experts and passionate hobbyists worldwide to join forces in identifying and rectifying any potential security vulnerabilities or bugs in the Atomic Wallet App, ensuring an even more secure experience for millions of users globally.
"Recent events in the blockchain industry have once again reminded us that cybersecurity is a dynamic field, and the best way to stay ahead is by harnessing the creativity and expertise of the global community," noted Konstantin Gladych, Founder of Atomic Wallet. "We are confident and eager to see how this program will contribute to our mission of providing a secure and seamless user experience."
Atomic Wallet is taking an extraordinary step by adding an additional security layer and crowdsourcing security measures through its Bug Bounty Program.
Participation in the Bug Bounty Program is open to anyone with the skills and determination to help Atomic Wallet strengthen its security infrastructure. Whether you're an experienced cybersecurity professional or a passionate hobbyist, your contributions are welcome.
The cumulative prize pool of $1,000,000 is a testament to Atomic Wallet's commitment to the highest levels of data security and enhancing app functionality.
Please familiarise yourself with the Bug Bounty Policy and Program Rules, Eligibility criteria, and Submission guidelines. We aim to make the process as transparent and straightforward as possible, ensuring seamless collaboration between our security team and the global community.
Please read the out-of-scope section before beginning the testing.
Do NOT test the Atomic Wallet contact form or create multiple support tickets via different Atomic Wallet support channels.
Atomic Wallet will make its best effort to meet the following SLAs for our program participants:
Type of Response SLA in business days
First Response < 1 day
Time to Bounty < 7 business days (We respect your time and don't hesitate to reward)
Time to Resolution depends on severity and complexity
We’ll try to keep you informed about our progress throughout the process.
Please do not discuss this Program or any vulnerabilities (even resolved ones) outside of the Program without prior written consent from Atomic Wallet.
Please provide detailed reports with reproducible steps. If the report is not precise enough to reproduce the issue, the issue will not be eligible for a reward.
When reporting vulnerabilities, please consider (1) the attack scenario/exploitability, and (2) the security impact of the bug/vulnerability. The Google Bug Hunters University guide may help consider whether an issue has a security impact.
Submit one vulnerability per report.
WARNING: If the same exploit occurs across multiple endpoints, please include those endpoints under your single submission. Do NOT file multiple reports for the same exploit.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
When duplicates occur, we only award the first report received (provided it can be fully reproduced).
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service (including denial of service). Only interact with accounts you own or with the explicit permission of the account holder.
All submissions should be addressed to [email protected] with the subject: "Bounty: <description>" so we can handle it accordingly.
Technical vulnerabilities or security-related problems in any of our company's internet public surface (websites and subdomains underneath Atomic Wallet's control)
Technical vulnerabilities or security-related problems in our company's Desktop and Mobile Wallet applications.
Atomic Wallet makes use of several open (and closed) source libraries. If you discover a vulnerability in an open-source dependent library or OS component, we advise you to follow responsible disclosure procedures directly with the library or OS vendor. We will not pay bounties on undisclosed vulnerabilities found in dependent components. However, if you can demonstrate a severe vulnerability of any of our software/servers due to that library with a working Proof of Concept, we will, on a case-by-case basis, consider this in scope and grant rewards.
If you find a vulnerability that is not part of the in-scope vulnerabilities, please report it, and we will investigate it. Depending on the severity of the vulnerability, you will be listed in our Hall of Fame and may be eligible for a reward. Any rewards for out-of-scope vulnerabilities will be granted on a case-by-case basis.
The following issues are currently considered out-of-scope:
The following issues are currently considered do not attempt without permission:
To request permission, please email [email protected], add to the title “Bug Bounty”, and mention the details of your test, including what endpoint(s) you will be hitting, what type of scan/attack/etc you would like to try, and what you're trying to achieve. We will respond to your request within 2 working days, ideally less. We will approve the request as long as it is reasonably well thought out and we don't see a risk.
Any activities consistent with this policy will be considered authorized conduct, and we will not report them to any law enforcement agencies or initiate legal action against you. Suppose legal action is undertaken by a third party against you in connection with activities conducted under this policy. In that case, Atomic Wallet will take steps to make it known that your actions were conducted in compliance with this policy.
Atomic Wallet may change the rules of the Bug Bounty Program and may decide on bug payment amounts at its sole discretion at any time. We value the efforts of every participant; however, we reserve the right to adjust the program and determine appropriate rewards in each case. We will promptly communicate any changes to the Bug Bounty Program.
By participating in the Bug Bounty Program, you acknowledge and agree to these terms. If you have any questions, don't hesitate to contact our support team.
On April 30, a technical issue occurred where two nodes were operating simultaneously and both successfully found a block. This resulted in a case of double signing, leading to the slashing of Atomic Nodes without the ability to unjail
We’re excited to announce that we’re rolling out the beta version of our Atomic Web3 Wallet Browser Extension. We designed it to enhance your digital asset experience with cutting-edge security features, user-friendly interface, and seamless integration with your favorite blockchain applications.