Airtel Bug Bounty TNC
Airtel Bug Bounty TNC
Airtel Bug Bounty TNC
Airtel (“Company”) will be hosting a closed / invite only bug bounty on Saturday 8 th and Sunday 9th Feb 2020 in
Delhi NCR
All successful submissions will qualify for one or more of the following:
1. Letter of thanks and recognition; and/ or
2. Monitory reward depending on the impact of the issue. Rewards may range from INR 2,000/- to INR
35,000/-
Responsible Disclosure:
While conducting your research, we ask that
1. You will protect our users' privacy and data in good faith. You will not access or modify other user's data
without our permission.
2. You will ensure that no disruption is caused to the production systems, degradation of user experience
and destruction of data during security testing.
3. If you inadvertently cause a privacy violation or disruption in the absence of any malicious intention (such
as accessing account data, service configurations, or other confidential information) while investigating
an issue, be sure to disclose this immediately in your communication with us.
4. Once you discover an issue, you shall refrain from exploiting and/or proceeding with subsequent testing
for any reason (including demonstrating additional risk etc).
5. Discovered vulnerabilities cannot be disclosed to third parties or as part of paper reviews or conference
submissions. Such confidentiality of these terms, and the details of the bug shall be maintained by you in
perpetuity.
6. Should you wish to share details of the bug with others or disclose it publically; you will seek our explicit
written consent prior to doing so. Airtel will reserve the right to modify the disclosed information if required.
7. You do not violate any other applicable laws or regulations.
VIOLATIONS OF THIS SECTION COULD REQUIRE YOU TO RETURN ANY BOUNTIES PAID FOR THAT
VULNERABILITY, PAYMENT OF ANY LOSS OR DAMAGES THAT THE COMPANY MAY INCUR AS A
RESULT OF YOUR VIOLATION, ALONG WITH INITIATION OF ANY OTHER LEGAL ACTION THAT
COMPANY MAY DEEM FIT, AND DISQUALIFY YOU FROM PARTICIPATING IN THE PROGRAM IN THE
FUTURE,.
Our commitment:
In return, we commit to
1. Working with you to investigate and resolve the issue as quickly as possible
2. Keeping you informed of the status of the issue reported
3. Not pursue or support any legal action related to your research/testing.
Page 1 of 4
Eligibility
1. You are a customer of Airtel or a security researcher interested in making our sites and applications safe.
2. If you are/were employed (full time or partner role) by Airtel or are related to an employee or partner of
Airtel (spouse, parent or sibling), you are NOT eligible for the bug bounty program.
3. Airtel has the right to modify/alter the eligibility criteria at any point of time without any prior intimation.
Event Terms
Monetary bounties for security reports are entirely at Airtel’s sole discretion, and will be decided based on risk,
business impact, and other factors. Airtel has the right to suspend/modify/cancel any of these terms, or this Bug
Bounty event at any time prior to 8th February 2020.
Page 2 of 4
Unqualified Reports and False Positives (Indicative List)
Some submission types are excluded because they are dangerous to assess, and/or because they have low impact
to us. This section contains issues that are not accepted under this program, will be immediately marked as invalid,
and are not rewardable.
1. Security issues in third-party services that integrate with Airtel. These are not managed by Airtel and do
not qualify under our guidelines for security testing.
2. Findings from physical testing such as office access (e.g. open doors, tailgating).
3. Findings derived primarily from social engineering (e.g. phishing, vishing).
4. Functional, UI and UX bugs and spelling mistakes.
5. Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue.
6. Issues that require physical access to a victim's computer.
7. Network or application level Denial of Service (DoS/DDoS) vulnerabilities.
8. Website scraping.
9. Bugs requiring exceedingly unlikely user interaction.
10. Flaws affecting the users of out-of-date browsers and plugins.
The following finding types are specifically excluded from the bounty:
Page 3 of 4
d. SSL weak / insecure cipher suites
Name:
Signature:
Affix passport size photo
Date:
Page 4 of 4