๐คBillionAir Bug Bounty Program
Get up to 100 000 USD!
๐ค BillionAir offers rewards to the community for discovering and reporting vulnerabilities and bugs on our platform.
Our aim is to continuously enhance our platform's performance, and with a large community of security engineers, hackers, and observant players, we can work together to achieve this goal. By collaborating, we can improve the platform and defeat any bugs.
If a user uncovers a vulnerability, they should refrain from exploiting it. We request that finders allow us to solve the issue before making it public. The privacy and security of our community is of paramount importance, and we appreciate your efforts in maintaining it.
If you identify any bugs and report them, you may be eligible for a substantial reward of up to 300,000 USD (in AIRB). Simply discover a vulnerability or bug, report it to us, and we will thoroughly investigate and resolve the issue while granting you the reward.
๐ Cases for Bug Bounty on BillionAir
Hot wallet accessibility - up to 100,000 USD (in AIRB) Vulnerabilities that allow withdrawal of funds from hot wallets.
Account penetration - up to 100,000 USD (in AIRB) Technical vulnerabilities that allow access to someoneโs account.
Balance manipulation - up to 50,000 USD (in AIRB) Vulnerabilities that allow manipulation of user balances.
Original game bugs/exploits - up to 50,000 USD (in AIRB) House edge bugs or vulnerabilities in Original games that allow to win consistently.
Server vulnerability - up to 50,000 USD (in AIRB) Attacks on a platform that leads to its partial or total incapacity.
Platformโs bonuses abuse - up to 50,000 USD (in AIRB) Any exploits from Referral bonuses, etc.
Bugs/exploits in the Integrated games (Slots, Live, Table and Sportsbook) - up to 20,000 USD (in AIRB) Bugs in games from different providers that allow to win consistently.
Medium functional bugs - up to 1,000 USD (in AIRB) Functional platform defects that do not concern layout, text typos, and other visual defects.
The severity of the vulnerability in any of the above cases determines the size of the reward, which is determined by our team during testing.
๐จ BillionAir Bug Bounty report flow
If you happen to discover a bug, exploit, or vulnerability, we kindly request that you report it to support@billionair.com. Please provide a detailed description of the bug, including step-by-step instructions on how to reproduce it, along with a detailed explanation and outcomes. Below you will find a summary of the BillionAir report procedure and important aspects:
It's crucial that any information regarding a bug, exploit, or vulnerability is kept confidential and not shared on any online platform, including forums and communities.
The initial response from BillionAir may take up to three days.
We will review all aspects of your report within one week of receiving the initial response. Following this, we will inform you of the test outcomes.
If we have confirmed and replicated the bug, we will be committed to resolving it as quickly as possible. Our goal is to fix the vulnerability within two weeks of its initial confirmation.
If the bug has not been verified or replicated, or if it is a known issue, the BillionAir team will close the case without offering any reward.
โ ๏ธ If you have found a critical bug, BillionAir asks you to get in touch with our mods in our Telegram chat for a faster response to the problem.
๐ Report Closure
BillionAir's Bug Bounty program ensures that all reported findings are thoroughly verified. Each report is carefully assessed to determine its legitimacy. If the report lacks clarity, we request further details from the reporter. Following the gathering of all relevant data, the report undergoes an internal review and evaluation process. Once this process is completed, any bugs that are found to be unverifiable, invalid, or unhelpful will be closed. To ensure that reports are dealt with efficiently, investigators must provide in-depth information and supporting evidence. Failure to do so may result in delayed ticket resolution or closure. If a user uncovers a vulnerability, they should refrain from exploiting it. We request that researchers allow us to solve the issue before making it public. Please provide us with a comprehensive description of the problem and any steps you may have taken to reproduce it. We kindly ask that you respect the privacy, confidentiality, and integrity of our users' data. The privacy of our community is of paramount importance, and we appreciate your efforts in maintaining it. Please understand that we cannot cooperate with anyone who violates relevant laws or regulations, attempts to exploit a security issue, or accesses other users' data.
Last updated