After submission, anticipate a review period while we conduct a comprehensive evaluation of your findings.
We value reports that identify security-related bugs. These are the only types eligible for rewards.
Our incentive program is adaptable. We recognize and reward contributions based on their impact and complexity.