logo
  • Items arrow-down
    Accounts arrow-down
    Services arrow-down
    More arrow-down
    Sell arrow-down
    Popular
    There are no entries to show here. Please consider changing search keywords, or updating filter options.
  • Cart
  • Notifications arrow-down
    Notifications
    check remove
    arrow_drop_down
    check
    All
    check
    Read
    check
    Unread
    check remove
    arrow_drop_down
    check
    All
    check
    Read
    check
    Unread
  • Sign In
  • edit
    User avatar
    Choose an avatar or upload a new image
    Brand logo See Avatars
    Upload image
    User avatar
    Choose an avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Chicks avatar
    Upload Image
    Chicks avatar
    Upload Image
    Upload an avatar Drag your files
      • Profile
      • Subscription
      • Orders
      • Balance
      • Verification
      • Security
      • Support
    There are no entries to show here. Please consider changing search keywords, or updating filter options.
Items
Accounts
Services
Swap
More
Sell
USD
ENG
There are no entries to show here. Please consider changing search keywords, or updating filter options.

Bug Bounty

Last Updated: 9 February 2026

Chicks Gold welcomes responsible security researchers to help identify vulnerabilities in our systems. This program defines authorized testing, scope, reporting requirements, and reward eligibility.

1. Program Rules

  • Test only assets explicitly listed as in scope.
  • Active testing and exploitation are permitted only on development and staging environments.
  • Production systems are limited to passive testing.
  • Do not disrupt service availability.
  • Do not access, modify, or destroy real user data.
  • Use only accounts you own or are explicitly authorized to use.
  • Cease testing once impact is confirmed.
  • Report vulnerabilities promptly after discovery.
  • Public disclosure is prohibited without written authorization.
  • Failure to comply may result in disqualification.

2. Confidentiality

  • All vulnerability reports are treated as confidential.
  • Disclosure to third parties is prohibited without approval.
  • Researcher identities will be handled confidentially where possible.
  • A disclosure embargo may be required prior to any public release.

3. Eligibility

  • Participants must comply with all applicable laws.
  • Employees, contractors, and immediate family members are ineligible.
  • Automated tools are permitted provided they do not degrade service availability.
  • Submissions must include reproducible steps and verifiable proof.

4. Environments and Testing Restrictions

4.1. Authorized Testing Environments:

Active testing and exploitation are authorized exclusively on:

  • Development environments.
  • Staging environments.

4.2. Production Environment Restrictions:

  • Production systems are restricted to passive testing only.
  • Exploitation, automation, modification, or abuse of production systems is prohibited.
  • Upon confirmation of a production issue, testing must cease and the issue must be reported immediately.

5. Domains in Scope

Only the domains listed below are eligible under this program.

5.1. Production Domains:

Passive testing only:

  • chicksgold.com
  • api.chicksgold.com
  • auth.chicksgold.com
  • checkout.chicksgold.com
  • chicksgroup.com
  • divicasales.com
  • aribagold.com
  • acckings.com
  • gamertotal.com

5.2. Development and Staging Environments:

Active testing is permitted for Chicks Gold-owned subdomains matching:

  • .dev.
  • .staging.

Including, but not limited to:

  • dev.chicksgold.com
  • staging.chicksgold.com
  • dev.chicksgroup.com
  • staging.chicksgroup.com
  • dev.divicasales.com
  • staging.divicasales.com
  • dev.aribagold.com
  • staging.aribagold.com
  • dev.acckings.com
  • staging.acckings.com
  • dev.gamertotal.com
  • staging.gamertotal.com

Please note that development and staging environments may have certain security protections disabled and stack traces enabled by design, as these are testing environments. Reports based solely on these characteristics will not be considered valid findings.

5.3. Excluded Assets:

  • Any domain, IP address, or service not explicitly listed.
  • Third-party services not owned or operated by Chicks Gold.
  • Mobile applications unless explicitly included.

6. Eligible Vulnerabilities

The following vulnerability categories are eligible:

  • Authentication bypass.
  • Authorization flaws, including IDOR and privilege escalation.
  • SQL injection.
  • Remote code execution.
  • Server-side request forgery.
  • Cross-site scripting, stored and reflected.
  • Cross-site request forgery with demonstrable impact.
  • Business logic vulnerabilities with security or financial impact.
  • Sensitive data exposure.
  • Subdomain takeover.

7. Ineligible Findings

The following are not eligible:

  • Denial of Service or distributed denial of service.
  • Load or stress testing.
  • Social engineering or phishing attacks.
  • Physical attacks.
  • Self-XSS.
  • Clickjacking without demonstrable impact.
  • Missing security headers without exploitability.
  • Rate-limiting.
  • Issues requiring outdated browsers or non-standard configurations.
  • Reports lacking reproducibility or impact.
  • Hijacking scenarios dependent on user-side issues or third-party compromises.
  • Exposed third-party API keys (e.g. Google Maps, Firebase) without demonstrable impact.
  • Outdated libraries or known CVEs without a working proof of concept.

8. Subdomain Takeover Criteria

Subdomain takeover findings are eligible only when:

  • The subdomain resolves to an unclaimed third-party service.
  • Full control of the subdomain can be demonstrated.
  • The affected domain is explicitly in scope.
  • The issue presents a realistic security or user impact.

9. Application and Business Logic Vulnerabilities

Examples include:

  • Broken access control.
  • Session fixation or hijacking.
  • Token leakage.
  • API authorization bypass.
  • Payment manipulation.
  • Balance, discount, or coupon abuse.
  • Order or checkout tampering.
  • Logic flaws enabling unauthorized benefits.

10. Reporting Requirements

All submissions must include:

  • A clear description of the vulnerability.
  • Affected domain and environment.
  • Step-by-step reproduction instructions.
  • Proof of concept demonstrating the issue.
  • Impact assessment.
  • Suggested remediation, if available.
  • Reports lacking sufficient detail may be closed without reward.

11. Response Time Expectations

  • Initial response within 48 hours.
  • Triage within five business days.
  • Resolution timelines vary based on severity and complexity.

12. Reward Structure

Rewards are determined based on severity, impact, exploitability, and report quality. CVSS is used as a guideline and does not guarantee a specific payout.

12.1 Standard Reward Ranges:

  • Critical (9.8 - 10.0): Up to $600
  • High (7.0 - 9.7): $60 - $200
  • Medium (4.0 - 6.9): $35 - $60
  • Low (0.1 - 3.9): $15 - $35
  • UI-related security findings: Up to $15
  • UI-related findings must demonstrate security relevance. Purely cosmetic issues are excluded.

13. Duplicate Submissions

  • Only the first valid submission of a vulnerability is eligible for reward
  • Subsequent reports of the same root issue will be classified as duplicates
  • Reports may still be eligible if they demonstrate:

a. A distinct attack vector.

b. A materially higher impact.

c. An additional affected system not previously identified.

d. Chicks Gold retains final authority in duplicate determinations.

14. Report Quality Examples

14.1 High-Quality Report:

A high-quality report is precise, reproducible, and impact-focused. Example:

  • Clear title identifying vulnerability and affected system.
  • Environment specified.
  • Reproducible steps with supporting evidence.
  • Clear explanation of security impact.
  • Justification for severity assessment.

14.2 Low-Quality Report:

Low-quality reports typically exhibit one or more of the following:

  • Vague or sensational titles.
  • No environment or scope identification.
  • Missing reproduction steps.
  • No proof of exploitability.
  • No articulated impact.
  • Opinion-based or cosmetic observations.
  • Such reports may be closed without reward.

15. Legal Safe Harbor

Chicks Gold will not pursue legal action against researchers who:

  • Adhere to this program’s rules.
  • Act in good faith.
  • Avoid privacy violations.
  • Do not exploit vulnerabilities beyond proof of concept.
  • Immediately report accidental exposure to real user data.

16. Legal

Participation does not create an employment relationship, grant ownership rights, or guarantee rewards. Chicks Gold reserves the right to modify or terminate this program at any time.

17. Contact

Vulnerability reports and inquiries should be submitted to: [email protected]

Logo chicks-logo [email protected]
ENG / USD
There are no entries to show here. Please consider changing search keywords, or updating filter options.
There are no entries to show here. Please consider changing search keywords, or updating filter options.
Chicks Gold
About Us Blog Bug Bounty
More
There are no entries to show here. Please consider changing search keywords, or updating filter options.
Support
Contact Us FAQ Sitemap
Legal
Privacy Policy Terms of Service Copyright Policy
More
Editorial Policy
Code of Ethics
Complaints Policy
Disclaimer
Cookies Policy
Accessibility
Modern Slavery Statement
Careers
There are no entries to show here. Please consider changing search keywords, or updating filter options.
Chicks Gold
About Us Blog Bug Bounty
More
There are no entries to show here. Please consider changing search keywords, or updating filter options.
Support
Contact Us FAQ Sitemap
Legal
Privacy Policy Terms of Service Copyright Policy
More
Editorial Policy
Code of Ethics
Complaints Policy
Disclaimer
Cookies Policy
Accessibility
Modern Slavery Statement
Careers
There are no entries to show here. Please consider changing search keywords, or updating filter options.
Trustpilot Reviews
Star iconStar iconStar iconStar icon Half Star icon 4.4/5
Social
Trustpilot Reviews
Star iconStar iconStar iconStar icon Half Star icon 4.4/5
Copyright © 2017, ChicksGold.com. All Rights Reserved.
undefined