At Liminal, we have adopted a security first approach. Security is at the heart of everything we do. Below document will give you a comprehensive idea about the various security layers that have been built into the Liminal platform.

BUG BOUNTY PROGRAM

Targets

URLs

Reporting Format

Out of Scope

Rules

Qualifying vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) the security impact of the bug. The following issues are considered in scope:

Non-Qualifying vulnerabilities

Reward Guidelines

Reward thresholds

Note: Publishing vulnerability details on any social media platform or elsewhere is prohibited without prior approval of the Liminal product security team. Liminal reserves all legal rights to take action and disqualify rewards against the individual or group.

Bug Bounty Program