Back to Site **Get Support Submit a Ticket**

About

Getting Started Guide

Get Help

Policies and Security

Terms of Service

Privacy Policy

Other Policies

Product

What’s New ⭐

Features

Roadmap

Bounty Programs

Bug Bounty Program

Bug Bounty Program

"- Fed Net Announcer. Every day, Federal scientists are looking for new ways to kill bugs”


Security is core to our values, and we value the input of security researchers to help us maintain a high standard for security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of good-faith in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.

"The only good bug is a dead bug.” 🐞

Expectations

When working with us according to this policy, you can expect us to:

Scope

The following are the list of platforms that are within this scope of the program.

Out of Scope

The following are the list of exploits/flaws that are ineligible for this program.

Rewards

Machi-Systems Website, Hub, and Applications

Category Paypal Credit Service Credit
XXS $ 150 $ 300
XSS (Bypassing CSP) $ 1,000 $ 1,500
CSRF $ 300 $ 600
Authentication Bypass $ 1,500 $ 3,000
SQL Injection $ 10,000 $ 10,000
Arbitrary code execution $ 4,000 $ 8,000
Arbitrary code execution (with privilege escalation) $ 15,000 $ 30,000
Persistent code change $ 10,000 $ 20,000

Machi-Systems Servers

Category Paypal Credit Service Credit
Authentication Bypass (SSH, FTP, VPN, etc.) $ 500 $ 1,000
Authentication Bypass of Supported Apps $ 250 $ 500
Local privilege escalation $ 1,000 $ 2,000

The List of the Researchers who report the valid vulnerabilities and exploits will be displayed on our Hall of Fame to extend our gratitude towards them.

Receiving Your Award

Ground Rules

Safe Harbor

When conducting vulnerability research according to this policy, we consider this research conducted under this policy to be:

You are expected, as always, to comply with all applicable laws. If a third party initiated legal action against you and complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy. If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through the Machi-Systems Ticket System before going any further.

Disclosure Policy

If you believe you have discovered a vulnerability, please create a ticket through the Mach-Systems Ticket System.

Machi Bug Bounty Hall of Fame

We thought we were smarter than the Bugs.


<aside> ⚙ Coming Soon!

</aside>

“Every time we killed a thousand Bugs at a cost of one M.I. it was a net victory for the Bugs. We were learning, expensively, just how efficient a total communism can be when used by a people actually adapted to it by evolution; the Bug commisars didn't care any more about expending soldiers than we cared about expending ammo. Perhaps we could have figured this out about the Bugs... ...the trouble with 'lessons from history' is that we usually read them best after falling flat on our chins.” ― Robert A. Heinlein, Starship Troopers

We hope you’ve found this doc useful. Is anything missing? If so, email us at [email protected] and we’ll get it sorted for you.


<aside> ⚡ Creating for good cause? ✨ If you are building or creating something that works towards solving mental health, wellbeing or environmental issues, then you can get access to Machi-Systems services at a reduced rate. Please get in touch for more information. Get in touch →

</aside>



Questions? Send us a note and we'll get right back to you.