Submit your findings.
Our Security Team reviews every submitted report. If accepted, you will have direct communication with one of our team members through the investigation process. You may be asked to provide additional information.
We encourage you to submit thoughtfully investigated and clearly written reports explaining in detail your methodology, results and recommendations. Reports consisting solely and entirely of testing tool outputs are not preferred. We look forward to receiving your high quality research.
How to Submit
If you have found a security vulnerability we encourage you to submit your reports to firstname.lastname@example.org including:
Steps to reproduce
Proof of concept /Evidence
Clear, thoughtful analysis
All bounty rewards will be paid in STORJ Token.