Program "Bug Bounty"

We ask you to inform us about the vulnerabilities found and are ready to pay the rewards depending on their Seriousness.

The AccStorage team pays special attention to safety.

  • We respond promptly to vulnerability messages – usually within 24 hours.
  • If the problem is confirmed, we reward you depending on its danger and scale.

If you find a vulnerability – please contact: @encorejeune
In the message indicate: 1. Describe the vulnerability
2. Show the step-by-step scenario of its reproduction

[!] Please do not post information about the vulnerabilities found in open sources or do not tell about them are third parties, until they are eliminated.
Do not use the vulnerabilities found to access other users’ data, or interference website.

What goes beyond this program

  • Social engineering aimed at company employees or buyers
  • Vulnerabilities detected by automated scanners without analysis and confirmation
  • DOS Type Attacks and Other Methods of Attacking Resource Depletion
  • Problems caused by old versions of browsers or their plugins
  • Attempts to access the company's physical facilities
  • Attacks related to phishing and other fraud methods
  • Low-priority bugs such as typos or minor design problems