At Liminal, we have adopted a security first approach. Security is at the heart of everything we do. Below document will give you a comprehensive idea about the various security layers that have been built into the Liminal platform.
Why you should trust us?
Blockchain Security
Account Security
Compliance and Certifications
Infrastructure Security
Internal Controls
Vulnerability Disclosure Policy
At Liminal, we welcome contributions from security researchers. If you believe you have found a security vulnerability that impacts Liminal, we encourage you to contact us immediately. Our team will investigate all legitimate reports and do our best to respond in a timely manner.
To participate in our private bug bounty program or learn more about the terms of our program, including our scope, bounties, or safe harbor guarantee, please email [email protected].
Our commitment to security researchers is simple: we will not take action against anyone who reports an issue in a responsible manner. We will do our best to reply to you in a timely fashion and periodically update you on our progress with respect to investigating or remediating any issues you may have identified.
You can find the details about our bug bounty program below:
BUG BOUNTY PROGRAM
URLs
When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) the security impact of the bug. The following issues are considered in scope:
Note: Publishing vulnerability details on any social media platform or elsewhere is prohibited without prior approval of the Liminal product security team. Liminal reserves all legal rights to take action and disqualify rewards against the individual or group.