How to report a security vulnerability in our infrastructure or services, and what happens next.
If you believe you have discovered a security vulnerability affecting cryptoservers.io or the underlying infrastructure, please report it via one of the following channels:
/.well-known/security.txt per RFC 9116.Please do not report vulnerabilities through public channels (GitHub issues, Twitter, Mastodon, support tickets) before we have had the opportunity to respond.
cryptoservers.io web property and all subdomains.panel.cryptoservers.io)./.well-known/ directory and its signed content.Payable in USD (via bank transfer) or the crypto of your choice (BTC, XMR, LTC, ETH, DASH, BCH, DOGE) at the spot rate on the day of award.
| Severity (CVSS v3.1) | Bounty | Example |
|---|---|---|
| Critical (9.0 – 10.0) | $5,000 – $15,000 | Hypervisor escape, panel RCE, bulk PII exfiltration |
| High (7.0 – 8.9) | $1,500 – $5,000 | Authenticated RCE, privilege escalation in the panel, SSRF into internal network |
| Medium (4.0 – 6.9) | $300 – $1,500 | Stored XSS in panel, IDOR exposing non-PII |
| Low (0.1 – 3.9) | $50 – $300 | Open redirect, missing rate-limit with no direct impact |
Duplicate reports are awarded on a first-valid-submission basis. The top bounty we have paid to date is $12,000 (2025-09-11, hypervisor-live-migration TOCTOU). All valid researchers are listed in the Hall of Fame on opt-in.
Research conducted within the scope and spirit of this policy is not considered unauthorised access under Saint Kitts law or the law of our operating jurisdictions, and we will not pursue civil or criminal action against researchers acting in good faith. Specifically:
If you accidentally step out of scope — with good-faith intent — contact us immediately and we will work through it together.