diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html
index 3307df6493..2efd65dcde 100644
--- a/Meta/Websites/serenityos.org/bounty/index.html
+++ b/Meta/Websites/serenityos.org/bounty/index.html
@@ -21,6 +21,7 @@
The PoC exploit needs to work against the master branch at the time of claim.
Max 5 bounties per person.
No duplicates. If a bug is already reported, only the earliest reporter may claim the reward. This includes bugs found by continuous fuzzing systems.
+ No rewards for bugs that require unlikely user interaction or social engineering.
Remote bugs must be exploitable with an unmodified "default setup" of SerenityOS. Bugs in programs that are not started by default don't qualify.
The PoC exploit needs to work on a QEMU-emulated CPU that supports SMAP, SMEP, UMIP, NX, WP, and TSD natively.
SerenityOS always runs with assertions enabled, so you'll need to find a way around them.