diff --git a/Meta/Websites/serenityos.org/bounty/index.html b/Meta/Websites/serenityos.org/bounty/index.html index 3307df6493..2efd65dcde 100644 --- a/Meta/Websites/serenityos.org/bounty/index.html +++ b/Meta/Websites/serenityos.org/bounty/index.html @@ -21,6 +21,7 @@
  • The PoC exploit needs to work against the master branch at the time of claim.
  • Max 5 bounties per person.
  • No duplicates. If a bug is already reported, only the earliest reporter may claim the reward. This includes bugs found by continuous fuzzing systems.
  • +
  • No rewards for bugs that require unlikely user interaction or social engineering.
  • Remote bugs must be exploitable with an unmodified "default setup" of SerenityOS. Bugs in programs that are not started by default don't qualify.
  • The PoC exploit needs to work on a QEMU-emulated CPU that supports SMAP, SMEP, UMIP, NX, WP, and TSD natively.
  • SerenityOS always runs with assertions enabled, so you'll need to find a way around them.