Telegram Apps Center: Program Info

Triaged by HackenProof
TON Studio

Community-driven catalog of applications developed by third-party developers.

This bug bounty program is focused on https://t.me/tapps itself and TON apps which are listed within this bot.

In Scope

Target Type Reward
https://t.me/tapps
Other Bounty
Apps which are listed within @tapps bot and meet TON-based criteria
Other Bounty
https://t.me/Open_league_bot
Other Bounty

IN-SCOPE VULNERABILITIES (Telegram BOT)

We are interested in the following vulnerabilities:

  • Business logic issues
  • Payments manipulation
  • Remote code execution (RCE)
  • Injection vulnerabilities (SQL, XXE)
  • File inclusions (Local & Remote)
  • Access Control Issues (IDOR, Privilege Escalation, etc)
  • Leakage of sensitive information
  • Server-Side Request Forgery (SSRF)
  • Directory traversal
  • Other vulnerability with a clear potential loss

OUT OF SCOPE

Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:

  • Vulnerabilities in Telegram applications
  • Assets that do not belong to the company
  • Best practices concerns
  • Recently (less than 30 days) disclosed 0day vulnerabilities
  • Vulnerabilities affecting users of outdated browsers or platforms
  • Social engineering, phishing, physical, or other fraud activities
  • Reports that generated by scanners or any automated or active exploit tools
  • Vulnerabilities involving active content such as web browser add-ons
  • Most brute-forcing issues without clear impact
  • Denial of service (DoS/DDoS)
  • Theoretical issues
  • Moderately Sensitive Information Disclosure
  • Spam (sms, email, etc)
  • MitM and local attacks
  • Attacks requiring physical access to a user's device
  • Vulnerabilities that require root/jailbreak
  • Vulnerabilities requiring extensive user interaction

*Hackers must ensure the application meets the specified criteria before starting testing

  • Do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
  • No vulnerability disclosure, including partial is allowed for the moment.
  • Please do NOT publish/discuss bugs

Reports for applications must include:

  • Confirmation of on-chain interaction.
  • Blockchain interaction logs (e.g., transaction hashes, smart contract IDs, or interaction with TON APIs).

In Scope

At least one of the following must be met

On-Chain Interaction via TON Blockchain

  1. The application performs transactions recorded on the TON Blockchain (e.g., payments for goods, participation in DAO, interaction with NFTs, or any smart contracts on TON).
  2. The application uses smart contracts to execute application logic.

Integration with TON Ecosystem

  1. The application utilizes mechanics directly tied to TON (e.g., token airdrops with verified smart contract logic, TON DNS, TON Storage, or other similar tools).
  2. The application provides functionality exclusively accessible through TON Wallet (e.g., using TON Connect for authorization and operations related to TON).

Interaction with TON Wallet

  1. The application must include functionality beyond simple authorization via TON Connect.
  2. Users can perform actions requiring transaction signatures via TON Wallet.
  3. TON Wallet usage is verified for business-critical operations (e.g., payments, subscriptions, asset withdrawals/deposits).

Out of Scope

  1. Applications using only TON Connect for login without additional TON Blockchain mechanics.
  2. Airdrops without actual on-chain interaction or verified smart contracts.
  3. Applications that claim future TON integration but lack it in the current version.
  4. Applications operating exclusively on testnet instead of mainnet.