
Iron Fish
External Program
Submit bugs directly to this organization
Iron Fish is Seamless, Safe Crypto Iron Fish encrypts every transaction, shielding your sensitive asset information from public view. With read-only view keys, you remain compliant and in control.
Anything that is not included in the scope doc is out of scope, https://hackerone.com/iron_fish_bbp/policy_scopes
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
Iron Fish will make a best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
|---|---|
| First Response | 2 days |
| Time to Triage | 2 days |
| Time to Bounty | 14 days |
| Time to Resolution | depends on severity and complexity |