Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

![0pttimus Avatar](https://lunarcrush.com/gi/w:24/cr:twitter::1493840346.png) 0𝙿𝚃𝚃𝙸𝙼𝚄𝚂 🦺 | 魚男 🐟 [@0pttimus](/creator/twitter/0pttimus) on x 2956 followers
Created: 2025-07-18 15:27:34 UTC

🏴‍☠️ MyTonWallet Air Security Bounty Program

For ethic hackers & security researchers 🤨

Prize fund: Up to $XXXXXX

Deadline: X August 2025 at 14:00 CET

X. The Task

We’re inviting security researchers to audit MyTonWallet Air—our new native app for iOS and Android.

Your mission: find and responsibly disclose security vulnerabilities that could compromise user assets, privacy, or overall security through code analysis.

This is a public security bounty program focused on identifying critical, high-impact issues before full release.

How to Access the Code?

iOS and Android source code for MyTonWallet Air is available here;

X. What Counts as a Valid Vulnerability?

We’re specifically interested in serious vulnerabilities such as:

• Unauthorized access to wallets or private data
• Bypassing authentication or authorization flows
• Transaction forgery or signing without user consent
• Cryptographic failures
• Anything leading to token theft or DoS

Minor UI glitches, layout issues, typos, performance lags, or non-security-related behavior should be submitted via the QA Contest;

X. Submission Guidelines

Please include in your report:

• Clear description of the vulnerability
• Code location and affected components
• Clear reproduction steps or proof-of-concept
• Potential impact
• Screenshots or other content if applicable

Submit your reports directly to @mysafewallet for all security disclosures.

X. Evaluation Criteria

Our team will assess each submission based on:

· Severity and potential impact
· Reproducibility and clarity of reporting
· Quality of documentation or proof-of-concept
· Responsible disclosure and ethical conduct

Only valid, original, and verifiable submissions will be considered for rewards.

X. Rewards & Contact

Rewards will be distributed based on the severity and quantity of vulnerabilities found.

If multiple participants discover the same vulnerability, the reward will be distributed as follows: XX% to the first reporter, and the remaining XX% shared equally among all reporters of the same issue.

Send your reports directly to @mysafewallet—top submissions will be rewarded accordingly.

![](https://pbs.twimg.com/media/GwJmMMKWoAAPTIS.jpg)

XX engagements

![Engagements Line Chart](https://lunarcrush.com/gi/w:600/p:tweet::1946230371265446364/c:line.svg)

**Related Topics**
[coins privacy](/topic/coins-privacy)
[android](/topic/android)
[ios](/topic/ios)
[cet](/topic/cet)
[bounty](/topic/bounty)

[Post Link](https://x.com/0pttimus/status/1946230371265446364)

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

0pttimus Avatar 0𝙿𝚃𝚃𝙸𝙼𝚄𝚂 🦺 | 魚男 🐟 @0pttimus on x 2956 followers Created: 2025-07-18 15:27:34 UTC

🏴‍☠️ MyTonWallet Air Security Bounty Program

For ethic hackers & security researchers 🤨

Prize fund: Up to $XXXXXX

Deadline: X August 2025 at 14:00 CET

X. The Task

We’re inviting security researchers to audit MyTonWallet Air—our new native app for iOS and Android.

Your mission: find and responsibly disclose security vulnerabilities that could compromise user assets, privacy, or overall security through code analysis.

This is a public security bounty program focused on identifying critical, high-impact issues before full release.

How to Access the Code?

iOS and Android source code for MyTonWallet Air is available here;

X. What Counts as a Valid Vulnerability?

We’re specifically interested in serious vulnerabilities such as:

• Unauthorized access to wallets or private data • Bypassing authentication or authorization flows • Transaction forgery or signing without user consent • Cryptographic failures • Anything leading to token theft or DoS

Minor UI glitches, layout issues, typos, performance lags, or non-security-related behavior should be submitted via the QA Contest;

X. Submission Guidelines

Please include in your report:

• Clear description of the vulnerability • Code location and affected components • Clear reproduction steps or proof-of-concept • Potential impact • Screenshots or other content if applicable

Submit your reports directly to @mysafewallet for all security disclosures.

X. Evaluation Criteria

Our team will assess each submission based on:

· Severity and potential impact · Reproducibility and clarity of reporting · Quality of documentation or proof-of-concept · Responsible disclosure and ethical conduct

Only valid, original, and verifiable submissions will be considered for rewards.

X. Rewards & Contact

Rewards will be distributed based on the severity and quantity of vulnerabilities found.

If multiple participants discover the same vulnerability, the reward will be distributed as follows: XX% to the first reporter, and the remaining XX% shared equally among all reporters of the same issue.

Send your reports directly to @mysafewallet—top submissions will be rewarded accordingly.

XX engagements

Engagements Line Chart

Related Topics coins privacy android ios cet bounty

Post Link

post/tweet::1946230371265446364
/post/tweet::1946230371265446364