
Liechtenstein National Administration (LLV) - Public
Bounty Range
$62 - $12,400
external program


Bounty Range
$62 - $12,400
external program
The Liechtenstein National Administration (LLV) provides all public services for the citizens, businesses, and financial sector of the Principality of Liechtenstein. As one of the most digitally advanced nations in Europe, the LLV operates a diverse portfolio of applications, ranging from national eID infrastructure and e-health services to complex platforms for international data exchange. We are committed to innovation and the highest security standards to ensure Liechtenstein's digital sovereignty and to protect the data of our citizens and corporate entities.
The Liechtenstein National Administration operates various services (Platforms, Services). Only services from explicitly listed domains/URLs are in the scope of the Bug Bounty Program. All other domains or explicitly listed services are therefore not eligible for reward and do not fall under the Legal Safe Harbor Agreement.
By participating in this Bug Bounty Program, Friendly Hackers undertake to document information about any vulnerability found exclusively via the platform's designated reporting form and not in any other places. You also agree not to publish the vulnerability found after reporting it on the platform, unless you have obtained written permission from Liechtenstein National Administration. Finally, they undertake to upload to the platform any data from customers that they have obtained as part of a Bug Bounty Program and to delete any local copies afterwards and not to distribute them further.
Hacking Methods
In participating in the program, ethical hackers agree not to use methods that would adversely affect the tested applications or their users. These methods include:
In addition to the prohibited hacking methods listed above, Friendly Hackers are required to immediately discontinue vulnerability scanning if they determine that their conduct will result in a significant degradation (negative impact on regular users or on the operations team) of the Platform's or Service's operations.
Automated tooling
max. 5 requests /sec
Request header
X-GObugfree-Username: {Username}
Qualified vulnerabilities
Any design or implementation problem can be reported that is reproducible and affects security.
Typical examples:
Other examples:
Non-qualified vulnerabilities
The following vulnerabilities and forms of documentation are generally not wanted and will be rejected:
Cost control
The program is suspended when the set cost limit is reached.
Not in scope:
All (sub) domains and services that are not explicitly listed within the scope, are not in scope
In scope:
The organisation gives their approval for security researchers to use hacking methods based on the specified briefing. Due to this consent, the criminal liability criterion of unauthorized obtaining/unauthorized use and thus the criminal liability of the security researchers with regard to the criminal offenses in Art. 143 Swiss Criminal Code (Unauthorised obtaining of data) and Art. 143bis Swiss Criminal Code (Unauthorised access to a data processing system) does not apply.
| Severity | Bounty |
|---|---|
| Critical | CHF 2000-10000 |
| High | CHF 1000-2000 |
| Medium | CHF 200-1000 |
| Low | CHF 50-200 |