← Back to 2018 Archive
ICON Foundation Runs Bug Bounty Program
November 21, 2018
ICON Foundation Runs Bug Bounty Program
Greetings from the ICON Team,
The ICON Foundation is pleased to announce a bug bounty program with HackerOne, a leading bug bounty platform with more than 100,000 registered hackers to improve the security of the ICON Network. A ‘Bug Bounty’ provides rewards to external researchers (white-hat hackers) who find vulnerabilities in software and expose them to the companies. The ICON Foundation is working on this program to detect vulnerabilities in the ICON Project and quickly apply security patches to build effective and reliable blockchain platforms.
HackerOne is a global cybersecurity company with numerous bug bounty practices, from a large number of big companies across diverse industries to the Pentagon. The world’s leading companies, including Google, Microsoft, Facebook, Starbucks, GM, and others, have used HackerOne’s bug bounty platform, and HackerOne has been recognized for trusted relationships with white-hat hackers and for the excellence of their platform.
In this program, many global hackers will join to check and report the vulnerabilities and bugs in ICON networks. The ICON Foundation will address the issues and strengthen the stability and security of the blockchain system through this program.
In the future, the ICON Foundation will continue to make efforts to improve security to build a more secure blockchain network.
Thank you,
Hyperconnect the World
ICON Team
______
ICON official communityHomepage : https://icon.foundation
Medium (ENG) : https://medium.com/helloiconworld
Brunch (KOR) : https://brunch.co.kr/@helloiconworld
KakaoTalk (KOR) : https://open.kakao.com/o/gMAFhdS
Telegram (ENG) : https://t.me/joinchat/Fqw4igkkVmYtj--ZVi-QcA
Telegram (KOR) : https://t.me/iconkorea
Facebook : https://www.facebook.com/helloicon/
Reddit : https://www.reddit.com/r/helloicon/
Twitter (Foundation) : https://twitter.com/helloiconworld
Twitter (Republic) : https://twitter.com/IconRepublic
Q&A : [email protected]