Cointree recognizes the importance and value of security researchers efforts in helping keep our community safe. We encourage responsible disclosure of security vulnerabilities via our bug bounty program described on this page.
Responsible investigation and reporting
Responsible investigation and reporting includes, but isn't limited to, the following:
- Do not violate the privacy of other members, destroy data, disrupt our services, etc.
- Only target your own accounts in the process of investigating the bug. Do not target, attempt to access, or otherwise disrupt the accounts of other members.
- Do not target our physical security measures, or attempt to use social engineering, spam, distributed denial of service (DDOS) attacks, etc.
- Initially report the bug only to us and not to anyone else.
- Give us a reasonable amount of time to fix the bug before disclosing it to anyone else, and give us adequate written warning before disclosing it to anyone else.
In general, please investigate and report bugs in a way that makes a reasonable, good faith effort not to be disruptive or harmful to us or our members. Otherwise your actions might be interpreted as an attack rather than an effort to be helpful.
Generally speaking, any bug that poses a significant vulnerability, either to the security of our site or the integrity of our trading system, could be eligible for reward. It is entirely at our discretion to decide whether a bug is significant enough to be eligible for reward.
Eligible bugs include, but not limited to::
- Cross-site request forgery (CSRF)
- Cross-site scripting (XSS)
- Code injection
- Remote code execution
- Privilege escalation
- Authentication bypass
- Leakage of sensitive Data
Domains in scope: auth.cointree.com, trade.cointree.com, api.cointree.com.
We generally do not accept reports for www.cointree.com unless a bug is critical as the site is isolated from all member data and authentication.
Things that are not eligible for reward include:
- Vulnerabilities on sites hosted by third parties (support.cointree.com, etc.) unless they lead to a vulnerability on our main domains.
- Vulnerabilities contingent on physical attack, social engineering, spamming, DDOS attack, etc.
- Vulnerabilities affecting outdated or unpatched browsers.
- Vulnerabilities in third party applications that make use of Kraken's API.
- Bugs that have not been responsibly investigated and reported.
- Bugs already known to us, or already reported by someone else (reward goes to first reporter).
- Issues that aren't reproducible.
- Issues that we can't reasonably be expected to do anything about.
- The minimum reward for eligible bugs is the equivalent of AUD $100 in bitcoin.
- Rewards over the minimum are at our discretion, but we will pay significantly more for particularly serious issues.
- Only one reward per bug.
- Remote code execution
- Ability to arbitrarily manipulate account balances
- User authentication bypasses
- Privilege escalation allowing unauthorized access to sensitive data or funds
- CSRF impacting non-critical settings
- User de-anonymization
- Leakage of lower sensitivity information such as name or email address
- Potential phishing vector that Cointree has the ability to mitigate
How to report a bug
- Submit your bug report by raising a support ticket
- Include as much information in your report as you can, including a description of the bug, its potential impact, and steps for reproducing it or proof of concept.
- Please allow five business days for us to respond before following up.