
fidentity
Bounty Range
$124 - $2,108
external program
fidentity helps you to digitize the identification of customers either on site or on line. Without the hassle of an app or additional hardware, ID documents can be scanned with a mobile phone. Liveness verified selfies and digital signatures are available. Artificial intelligence prevents fraud and ensures compliance. An automatic decision is available in real time to control the next step in the onboarding process.
fidentity operate various services (platforms, services). But only services from explicitly listed domains / URLs are in the scope of the Bug Bounty Program. All other domains or explicitly listed services are therefore not eligible for reward and do not fall under the Legal Safe Harbor Agreement.
By participating in this Bug Bounty Program, Friendly Hackers undertake to document information about any vulnerability found exclusively via the platform's designated reporting form and not in any other places. They also agree to keep the found vulnerability secret for 90 days after reporting it on the platform. Finally, they undertake to upload to the platform any data from customers that they have obtained as part of a bug bounty program and to delete any local copies afterwards and not to distribute them further.
important: If your run tests append '-bugbounty-gobugfree'' to the User-Agent string
In participating in the program, ethical hackers agree not to use methods that would adversely affect the tested applications or their users. These include:
In addition to the prohibited hacking methods listed above, Friendly Hackers are required to immediately discontinue vulnerability scanning if they determine that their conduct will result in a significant degradation (negative impact on regular users or on the operations team) of the Platform's or Service's operations.
Any design or implementation problem can be reported that is reproducible and affects security.
Typical examples:
Other examples:
The following vulnerabilities and forms of documentation are generally not wanted and will be rejected:
The program is suspended when the set cost limit is reached.
The following services and applications may be tested. All other targets and third party services not listed here are not in scope. Especially MAIL, Wordpress and other 3rd party software not in scope.
Quickstart Process:
{
"customer": {},
"customer": {},
"documentUris": [],
"extId": "{{$guid}}",
"noValidation": true,
"processSteps": [{"type": "DocumentRegistration", "subtype": "main"}, {"type": "Selfie"}],
"systemUrls": []
}
The organisation gives their approval for Friendly Hackers to use hacking methods based on the specified bug bounty program. Due to this consent, the criminal liability criterion of unauthorized obtaining/unauthorized use and thus the criminal liability of the Friendly Hackers with regard to the criminal offenses in Art. 143 Swiss Criminal Code (Unauthorised obtaining of data) and Art. 143bis Swiss Criminal Code (Unauthorised access to a data processing system) does not apply.
| Severity | Bounty |
|---|---|
| Critical | CHF 1300-1700 |
| High | CHF 700-1300 |
| Medium | CHF 400-700 |
| Low | CHF 100-300 |