follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Recent Posts

Pages: [1] 2 3 ... 10
1
Forum Signature Bounty / Animation Vids Signature Campaign 10$/week
« Last post by BountyManager on July 01, 2024, 03:29:50 pm »
This is a signature campaign for AnimationVids

Requirements:
  • Have an active forum account on a business forum
  • Your forum account allows to have image signature with link

What if you do not have an account on a business oriented forum ?
You can join https://www.entrepreneurpost.com/forum/
And try to grow your rank, once rank is Full member, you would be accepted in signature campaigns.
Make sure not to use AI, spam or do plagiarism.


To join:

1- Reply below with a link to your forum profile.

2- Put the temporary forum signature till you get approved:
Code: [Select]
  [b]Earn money with your forums profiles signatures on > BountyTalk.org[/b]

Once approved, you will get a message from the bounty manager.


Tasks:

1- Replace your forum signature with this one:
Code: [Select]
[url=https://animationvids.com/][img]https://i.imgur.com/Ew7PPaD.jpeg[/img][/url]I will message you with exact code that works with your forum software, when you are approved.

2- Contribute in the natural discussions in the forum + must have at least 20 topics created per week.


Payment:

1- Every 5 weeks you will be paid once.
2- The payment is done in the form of a gift card by AnimationVids
That you can resell online after posting here: Resell gift card to confirm by the issuer.
2
FAQ : Frequently Asked Questions / How to become a Bounty manager ?
« Last post by admin on June 24, 2024, 02:03:24 pm »
To become a bounty manager will depend on the kind of bounty.

1- If it's a bounty related to crypto (project that is associated with crypto, or even a new crypto project)
You will need to have a bounty manager badge on https://www.altcoinstalks.com/
More details: https://www.altcoinstalks.com/index.php?topic=125822.0


2- If It's a bounty for a project none related to crypto.
Please subscribe to get the rank assigned automatically.
https://www.bountytalk.org/index.php?action=profile;area=subscriptions;
3
FAQ : Frequently Asked Questions / What is a bounty ?
« Last post by admin on June 24, 2024, 12:03:48 pm »
A bounty is a commitment by a user to promote a project based on the project's promotion conditions.

Bounties are not simple actions that can be done by click farms and bots, instead, bounties rely on the ability of the user to act, understand and interact, bounties also sometimes require advance planning.

Some kinds of bounties we allow on this forum:

1- Forum signature bounty:
Our users must have a profile on another forum (established profile, not newly created profile > to avoid bad quality)
On our forum, they join a bounty offering to pay for signature
If they are accepted, they add a signature on their other forum, and continue being active.
Then they update their bounty request here, and get paid by the bounty manager.


2- Social media bounty:
You do not need another forum profile.
Users join the bounty, execute the tasks (that can last for a month or more), and get paid in due time.
A social media bounty is not only simple likes, tweets, retweets, shares.
The social media bounties simulate normal interactions, with our users preparing the role beforehand, and continuing with interactions for a specific period.


3- Bug bounty:
Certain companies are interested in finding vulnerabilities in their projects, thus offer bounties for whomever find a vulnerability.
This is open only for professional software bounty hunters.



4
FAQ : Frequently Asked Questions / Requirements to join this forum ?
« Last post by admin on June 24, 2024, 10:30:56 am »
Please translate this post (to your language), so that you understand it well.

Users are approved by admin based on these criteria:

+ Bounty managers: These are the mangers of the forum bounty/advertising campaign.
There are 2 ways to be approved as bounty manager:
- Pay for the rank via our subscription system (valid for crypto and non crypto related bounties).
- For crypto related projects: option 2 is to have a bounty manager account on: https://www.altcoinstalks.com/

+ Bounty hunters: These are the people that wish to join a bounty campaign to earn money.

there are 3 types:
- Crypto bounty hunters
- General bounty hunters (none crypto)
- Bug bounty hunters



For signature bounties:
You apply on this forum to a bounty, and if accepted you get to display an ad in your profile signature on another forum.
Requirements:
- You must have a forum account on another site > you will need to provide it on registration.
- If you are joining crypto related bounties, you are also required to also join https://www.altcoinstalks.com/ , to be able to interact with the project's ANN and discussions.

For other bounties:
- You need to provide your social media profile on registration (the one you will use Facebook/instagram/twitter/ etc ..)
this will only be seen by the administration, and is needed to manually validate your subscription.
5
Bug bounty programs / RollBar Bug Bounty
« Last post by Angelina on September 20, 2023, 07:27:08 pm »
submit bug report: https://docs.rollbar.com/docs/responsible-disclosure-policy

Responsible Disclosure Policy
Suggest Edits
Rollbar aims to keep its Services safe for everyone, and data security is of utmost priority. If you are a security researcher and have discovered a security vulnerability in the Services, we appreciate your help in disclosing it to us in a responsible manner.

Rollbar will engage with security researchers when vulnerabilities are reported to us in accordance with this Responsible Disclosure Policy. We will validate, respond and fix vulnerabilities in accordance with our commitment to security and privacy. We won't take legal action against or suspend or terminate access to the Services of those who discover and report security vulnerabilities in accordance with this Responsible Disclosure Policy. Rollbar reserves all of its legal rights in the event of any noncompliance.

Capitalized terms used in this Responsible Disclosure Policy and not otherwise defined have the meaning ascribed to such terms in our Terms of Service.

Testing
You may test only against an Account for which you are the Account owner or a Member authorized by the Account owner to conduct such testing. In no event are you permitted to access, download or modify data residing in any other Account or that does not belong to you or attempt to do any of the foregoing. You are also prohibited from:

executing or attempting to execute any "Denial of Service" attack;
knowingly posting transmitting, uploading, linking to, sending or storing any Malicious Software;
testing in a manner that would result in the sending unsolicited or unauthorized junk mail, spam, pyramid schemes or other forms of duplicative or unsolicited messages;
testing in a manner that would degrade the operation of the Services;
testing third party applications or websites or services that integrate with or link to the Services.
Reporting
Share the details of any suspected vulnerabilities with the Rollbar Security Team by sending an email to security@rollbar.com. Please do not publicly disclose these details without express written consent from Rollbar. In reporting any suspected vulnerabilities, please include the following information:

Vulnerability details with information to allow us to efficiently reproduce your steps
Your email address
Your name as it should be displayed on this page if you would like it to be
Your Twitter handle or website as it should be displayed
Compensation Requests
Requests for monetary compensation in connection with any identified or alleged vulnerability will be deemed noncompliant with this Responsible Disclosure Policy.

Our Commitment
If you identify a verified security vulnerability in compliance with this Responsible Disclosure Policy, Rollbar commits to:

Promptly acknowledge receipt of your vulnerability report
Provide an estimated timetable for resolution of the vulnerability
Notify you when the vulnerability is fixed
Publicly acknowledge your responsible disclosure
6
Bug bounty programs / Robeco Bug Bounty
« Last post by Angelina on September 20, 2023, 07:26:17 pm »
submit bug report: https://www.robeco.com/en/responsible-disclosure.html

Working on system security
Every day, specialists at Robeco are busy improving the systems and processes. This helps to protect the details of our clients against misuse and also ensures the continuity of our services. However, this does not mean that our systems are immune to problems. If problems are detected, we would like your help.

What can we expect from one another?
Report any problems about the security of the services Robeco provides via the internet. If you discover a problem or weak spot, then please report it to us as quickly as possible. Examples of vulnerabilities that need reporting are:

cross-site scripting vulnerabilities
SQL-injection vulnerabilities
encryption weaknesses
What do we expect from you?
Ensure that you do not cause any damage while the detected vulnerability is being investigated. Your investigation must not in any event lead to an interruption of services or lead to any details being made public of either the asset manager or its clients.

What do we do with your report?
A team of security experts investigates your report and responds as quickly as possible. We ask you not to make the problem public, but to share it with one of our experts. Give them the time to solve the problem. We will let you know what our assessment of your report is, whether we will provide a solution and when we plan to do that.

Rules of the game
There is a risk that certain actions during an investigation could be punishable. If you act in good faith, carefully and in line with the rules of the game supplied, there is no reason for Robeco to report you. So follow the rules as stated in these responsible disclosure guidelines and do not act disproportionately:

Do not use social engineering to gain access to a system.
Do not place a backdoor in an information system in order to then demonstrate the vulnerability, as this can lead to further damage and involves unnecessary security risks.
Make as little use as possible of a vulnerability. Only perform actions that are essential to establishing the vulnerability.
Do not edit or delete any data from the system and be as cautious as possible when copying data (if one record is enough to demonstrate the problem, then do not proceed further).
Do not introduce any system changes.
Do not try to repeatedly access the system and do not share the access obtained with others.
Do not use any so-called 'brute force' to gain access to systems. After all, that is not really about vulnerability but about repeatedly trying passwords.
How should you submit a report?
If you have detected a vulnerability, then please contact us using the form below.

What does not need to be reported via the disclosure point?
The disclosure point is not intended for:

submitting complaints about services
making fraud reports and/or suspicions of fraud reports from false mail or phishing e- mails
reporting viruses
submitting complaints or questions about the availability of the website
7
Bug bounty programs / RSK Bug Bounty
« Last post by Angelina on September 20, 2023, 07:24:55 pm »
submit bug report: https://developers.rsk.co/contribute/bug-bounty-program/

Bug Bounty Program
IOVLabs has created this bug bounty program to reward security researchers that dedicate time and effort to improve the IOVLabs platforms.


<< Contribute
8
Bug bounty programs / Onfo Bug Bounty
« Last post by Angelina on September 20, 2023, 07:23:15 pm »
submit bug report: desk.com/help-center-closed/?utm_source=helpcenter-closed&utm_medium=poweredbyzendesk&utm_campaign=text&utm_content=onfo.zendesk.com


Champions of customer service
OUR PRODUCTS
Zendesk for service
Zendesk for sales
Sunshine Platform
Marketplace
Product updates
TOP FEATURES
Ticketing system
Messaging & live chat
Help center
Voice
Community forums
Reporting & analytics
Answer Bot
Customer service software
Ticketing system software
Live chat software
Knowledge base
Forum software
Help desk software
Workforce management
RESOURCES
Security
Product support
Request a demo
Blog
Training
Partners
Webinars
Customer Stories
Services
COMPANY
About us
Newsroom
Investors
Events
Careers
Diversity & Inclusion
Accessibility Plan
Sustainability
Contact us
Sitemap
System status
Zendesk Foundation
Legal
FAVORITE THINGS
What is Zendesk
Zendesk for Enterprise
Zendesk for Small Business
Zendesk for Startups
Zendesk Benchmark
Gartner CRM Magic Quadrant
Customer Experience Trends
What is CRM?
CRM software guide
Join our research panel
9
Bug bounty programs / Notion Bug Bounty
« Last post by Angelina on September 20, 2023, 07:21:40 pm »
submit bug report:https://www.notion.so/Responsible-Disclosure-Policy-5f18bb6b86804eaf989c006131778b9c

# Response Targets

Notion Labs, Inc. will make a best effort to meet the following response targets for hackers participating in our program:

- Time to first response (from report submit) - 3 business days
- Time to triage (from report submit) - 10 business days
- Time to resolution (from report submit) - Varies depending on severity

We’ll try to keep you informed about our progress throughout the process. Feel comfortable reaching out with any questions.

# Disclosure Policy

- As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization.
- Follow HackerOne's [disclosure guidelines](https://www.hackerone.com/disclosure-guidelines).

10
Bug bounty programs / Nextcloud Bug Bounty
« Last post by Angelina on September 20, 2023, 07:18:48 pm »
submit bug report: https://nextcloud.com

We're inviting researchers all over the globe to take a look at Nextcloud and bring it's security to the next level. If you're interested in learning how we handle security you can read more about it on our dedicated security page.
Program policy
We know how valuable your time is and employ a "No bullshit policy" that boils down to: Don't be a jerk. Instead of bothering you with a huge list of exclusions we're going to tell you what we're especially looking after:
Bugs within Nextcloud server and apps supported by Nextcloud GmbH (Note: see scope below for all qualifying and packaged components. Third-party apps from the AppStore are not part of our bounty program.)
Bugs within the mobile iOS and Android sync clients
Bugs within the desktop sync clients for Mac, Windows, and Linux
A bug is for us something that actively allows an attacker to escalate their privileges. Something like "Attacker can delete arbitrary files of other users" is fine, "Missing X-Frame-Options on the download servers" not so much. At the moment we are also considering Denial of Service not a reward worthy vulnerability. (we will acknowledge you though!)
Found a security bug in one of the above-mentioned components? Awesome! Just report it here and we will get back to you. These components are also for what monetary rewards are awarded. Bonus points if you check back with our threat model before.
Found a bug in one of our websites or so? While we can't offer you any monetary reward we will acknowledge the issue and happily accept reports for it via this platform as well. But please do not run any Denial of Service attacks against our infrastructure or extract user data. Please do also refrain from using automated testing tools against our infrastructure or disclosing bugs to other parties before we have published a patch.
We believe in transparency about our security, so any valid vulnerabilities discovered are always publicly disclosed after a grace period.
Rewards
Our rewards are based on severity and range up to $10,000. To give you some guidance we have compiled below list:
Impact   Definition   Highest possible reward
Critical   Gaining remote code execution on the server as a non-admin user. (i.e. RCE)   $10,000
High   Gaining access to complete user data of any other user. (i.e. Auth Bypass)   $4,000
Medium   Limited disclosure of user data or attacks granting access to a single users' user session. (i.e. XSS with CSP bypass)   $1,500
Low   Very limited disclosure of user data or attacks involving a very high unlikely amount of user interaction.   $500
Last updated on August 3, 2021.
View changes
Looking for what's in scope? Check out the new Scope tab above.
Pages: [1] 2 3 ... 10