IFICHI
  • What is IFICHI?
    • Introduction
      • Synthetic Tokens
      • Interest Rate Mechanics
    • Approach & Framework
      • Final Remarks
    • Lending System
      • Code Base and Verification
      • Licensing
      • Protocol Mathematics
      • Governance System
    • Strategy for Progressive Decentralization
    • Security Precautions
      • Security Focus
      • Security Measures and Philosophy
    • Liquidation Mechanics
    • Bug Bounty
      • Ethical Research Guidelines
      • Commitment to Researchers
      • Discretion and Rights
      • Our Commitment to Researchers
    • Borrowing & Lending Process
    • Liquidity Provision Guide
      • Benefits
      • Custom Liquidity Model
      • Comparison with Uniswap
      • Liquidity Provider Shares
      • Trading hTokens
      • Market Impact
    • Tokenomics
      • Core Concepts
      • Allocation
Powered by GitBook
On this page
  1. What is IFICHI?
  2. Bug Bounty

Ethical Research Guidelines

Participants in the IFICHI bug bounty program are expected to:

  • Compliance: Adhere to the program's terms and any other relevant agreements, prioritizing the program's terms in case of inconsistencies.

  • Prompt Reporting: Report vulnerabilities immediately after discovery.

  • Non-Disruption: Ensure that the research doesn’t compromise others' privacy, disrupt IFICHI systems, destroy data, or degrade the user experience.

  • Confidentiality: Discuss vulnerabilities exclusively through security@ifichi.finance and maintain confidentiality until resolved.

  • Scope Respect: Conduct testing only within the defined scope, respecting out-of-scope systems and activities.

  • Account Interaction: Interact only with accounts owned or explicitly permitted by the owner.

  • Legal Conduct: Refrain from blackmail, extortion, or any illegal activities.

PreviousBug BountyNextCommitment to Researchers

Last updated 1 year ago