At Liminal, we have adopted a security first approach. Security is at the heart of everything we do. Below document will give you a comprehensive idea about the various security layers that have been built into the Liminal platform.

Why you should trust us?

BUG BOUNTY PROGRAM

Targets

URLs

Reporting Format

Out of Scope

Rules

Qualifying vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) the security impact of the bug. The following issues are considered in scope:

Non-Qualifying vulnerabilities

Bug Bounty Program