Program Rules
Avoid using web application scanners for automatic vulnerability searching which generates massive traffic
Make every effort not to damage or restrict the availability of products, services, or infrastructure
Avoid compromising any personal data, interruption, or degradation of any service
Don’t access or modify other user data, localize all tests to your accounts
Perform testing only within the scope
Don’t exploit any DoS/DDoS vulnerabilities, social engineering attacks, or spam
Don’t spam forms or account creation flows using automated scanners
In case you find chain vulnerabilities we’ll refer you to the Zetachain team to proceed further.
Don’t break a law at any point in the process.
Any details of found vulnerabilities must not be communicated to anyone who is not a Beam team member without appropriate permission.
Last updated