Bug Bounty Program
We are pleased to announce the launch of the NewCoin Bug Bounty Program and sincerely invite security researchers and white-hat hackers worldwide to participate in vulnerability discovery and security co-construction.
If you discover a security vulnerability during testing, please submit the complete vulnerability details to the official email: [email protected]
The NewCoin Security Team will review and verify each report upon receipt. Upon confirmation of a valid vulnerability, we will contact you and issue the corresponding reward.
Your security contributions are crucial to NewCoin.
I. Web Bug Bounty Program
1. Scope of Testing
NewCoin official website
Official web trading and account systems
2. Vulnerability Reward Standards
Low Risk: 50 – 100 USDT
Medium Risk: 100 – 500 USDT
High Risk: 500 – 1,000 USDT
Critical: 1,000 – 5,000 USDT
The final reward amount will be comprehensively evaluated based on the vulnerability's impact scope, exploitation difficulty, and actual harm.
II. Web Vulnerability Severity Definitions
(1) Critical Vulnerability Affects NewCoin's core business systems or critical infrastructure, potentially causing significant asset or systemic risks. Possible outcomes include:
Unauthorized control of core business systems
Obtaining highest administrative privileges of core systems
Complete takeover of key business modules
Examples:
Controlling multiple critical devices within the internal network
Gaining backend super administrator privileges leading to core data leakage
Fatal vulnerabilities in smart contracts (e.g., overflow, race conditions)
(2) High-Risk Vulnerability Can directly impact system security, user assets, or business logic integrity. Includes but is not limited to:
System privilege acquisition (GetShell, command execution)
SQL Injection
Authentication bypass, weak passwords, SSRF
Arbitrary file reading, XXE for arbitrary information access
Unauthorized transactions, payments, or fund operations
Severe business logic flaws (e.g., arbitrary user login, batch password modification)
Stored XSS with widespread impact
Large-scale source code leakage
Smart contract permission control flaws
(3) Medium-Risk Vulnerability Requires specific conditions or user interaction, potentially causing certain security impact. Includes but is not limited to:
Vulnerabilities requiring user interaction (e.g., stored XSS, CSRF)
Parallel authorization flaws (bypassing user data modification restrictions)
Denial of Service (DoS) attacks
CAPTCHA logic flaws enabling brute-force attacks
Leakage of sensitive authentication keys due to local or configuration issues
(4) Low-Risk Vulnerability Limited impact, or difficult to prove direct severe consequences. Includes but is not limited to:
Local DoS (client crash)
General information leakage (path traversal, directory browsing)
DOM / Reflected XSS
General CSRF
URL redirection vulnerabilities
SMS / Email bombing (similar issues counted once per system)
Other vulnerabilities without directly demonstrable security impact
III. Vulnerability Types Not Accepted
The following issues are excluded from the Bug Bounty Program scope:
Email spoofing
User enumeration
Self-XSS / HTML injection
Lack of security policies (e.g., CSP, SRI)
CSRF in non-sensitive operations
Android app configuration issues (e.g.,
android:allowBackup="true")Performance-only issues (e.g., slow requests due to image scaling)
Exposure of third-party component version information (e.g., Nginx version)
Functional flaws without security impact
Social engineering attacks targeting NewCoin employees
IV. Smart Contract Vulnerability Severity Definitions
(1) Critical Vulnerability
Manipulation of governance or voting results
Direct theft of user funds (excluding unclaimed yields)
Permanent freezing of user funds
Miner Extractable Value (MEV)
Overall protocol insolvency
(2) High-Risk Vulnerability
Theft or freezing of unclaimed yields / royalties
Temporary freezing of user funds
(3) Medium-Risk Vulnerability
Contract dysfunction due to insufficient tokens
Profiting from block congestion
Destructive behavior without direct profit motive
Gas theft or infinite gas consumption
(4) Low-Risk Vulnerability
No direct financial loss but affecting contract commitments
Informational issues (oracle errors, governance attacks, liquidity risks, Sybil attacks, etc.)
Best practices and security hardening suggestions
V. Prohibited Actions
To ensure platform and user safety, the following actions are strictly prohibited during testing:
Social engineering or phishing attacks
Public disclosure, dissemination, or sale of vulnerability details
Destructive testing (only PoC verification is allowed)
Large-scale scanning using unauthorized scanners
Modifying webpage content, pop-up bombing, cookie theft
Using highly intrusive or destructive payloads
If any unintended impact occurs during testing, please report it to NewCoin immediately.
Violations of the above rules may result in reward cancellation and potential legal liability.
VI. Closing Remarks
Thank you for your contributions to the security of the NewCoin platform.
We look forward to collaborating with security researchers worldwide to build a safer, more transparent, and more trustworthy crypto asset ecosystem.
NewCoin Security Team
Last updated