Bug Bounty Program

Help us improve our security by finding and reporting vulnerabilities. We value the contributions of security researchers and offer rewards for eligible findings.

Program Overview

At Zero Sum Defense, we take security seriously. Our Bug Bounty Program invites security researchers to help us identify and fix security vulnerabilities in our systems before they can be exploited.

We believe in the power of collaboration with the security community and are committed to working with responsible security researchers to improve our security posture.

Why Participate?

  • Earn cash rewards for finding valid vulnerabilities

  • Help protect sensitive data and improve platform security

  • Join our security researcher community and collaborate with our security team

  • Get recognition on our security researcher hall of fame (with your permission)

  • Contribute to open source security for selected components of our platform

Scope & Rewards

In-Scope Systems and Applications

Web Applications

  • actualize.zerosumdefense.io

Submission Process

Discover & Validate

Identify a vulnerability and validate that it's reproducible. Collect evidence and document the steps to reproduce.

Submit Report

Submit your findings through our secure reporting form or via email to security@zerosumdefense.co. Include all necessary details for us to reproduce the issue.

Verification

Our security team will review your report and verify the vulnerability. We aim to respond within 48 hours to acknowledge receipt of your report.

Remediation

We'll work on fixing the vulnerability. For critical issues, we aim to deploy a fix within 7 days. We'll keep you updated on the status of the fix.

Reward & Recognition

Once the vulnerability is fixed, we'll evaluate the report for a reward based on our severity criteria and process the payment. With your permission, we'll add you to our security hall of fame.

Reporting Requirements

  • Include detailed steps to reproduce the vulnerability

  • Provide screenshots, videos, or proof of concept when applicable

  • Describe the potential impact of the vulnerability

  • Suggest possible mitigations if available

  • Include the version/build number of the affected application

Contact Information

For security reports and bug bounty submissions:

Encrypting Your Report

We strongly recommend encrypting sensitive vulnerability information using our PGP key. Here's how to encrypt your report:

# Import our PGP public key
  curl -s https://actualize.zerosumdefense.io/pgp-key.asc | gpg --import
  
  # Encrypt your report
  gpg --encrypt --recipient security@zerosumdefense.co -a report.txt
  
  # This creates report.txt.asc which you can safely email to us
Download Our PGP Public Key

Safe Harbor Policy

We provide a safe harbor for security researchers who:

  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service

  • Only interact with accounts you own or with explicit permission of the account holder

  • Don’t exploit a security issue to gain additional access beyond what’s needed to prove the vulnerability

  • Report vulnerabilities directly to us and give us reasonable time to respond before disclosing to others

  • Provide sufficient information to reproduce the vulnerability so we can resolve it quickly

Hall of Fame

We're proud to recognize the security researchers who have helped improve the security of our platform. Visit our Hall of Fame to see our top contributors.

Frequently Asked Questions

Start Hunting

Ready to help us improve our security? Start hunting for vulnerabilities and submit your findings. We look forward to working with you!