Program Rules

  • Avoid using web application scanners for automatic vulnerability searching which generates massive traffic

  • Make every effort not to damage or restrict the availability of products, services, or infrastructure

  • Avoid compromising any personal data, interruption, or degradation of any service

  • Don’t access or modify other user data, localize all tests to your accounts

  • Perform testing only within the scope

  • Don’t exploit any DoS/DDoS vulnerabilities, social engineering attacks, or spam

  • Don’t spam forms or account creation flows using automated scanners

  • In case you find chain vulnerabilities we’ll refer you to the Zetachain team to proceed further.

  • Don’t break a law at any point in the process.

  • Any details of found vulnerabilities must not be communicated to anyone who is not a Beam team member without appropriate permission.

Last updated