DEV Community

Cover image for Web vulnerability bounty rules update
TECNO Security
TECNO Security

Posted on • Edited on

2

Web vulnerability bounty rules update

TECNO Security Response Center respects and thanks all security researchers for their contribution to TECNO security and for helping TECNO improve the security of its products and business. We will carefully evaluate every report and protect the interests of all security researchers to the greatest extent possible.

➡️Vulnerability Scope
Core Business

➡️General Business

  • security.tecno.com
  • tspot.tecno.com
  • www.carlcare.com
  • pcconnection.online
  • nebulalive.com
  • transsion-os.com
  • transsion-message.com
  • vishavideo.com
  • palm.tech

Bounty Reward

Image description

More details: TECNO Web Security Vulnerability Reward Rules V4.0

Image of Datadog

Create and maintain end-to-end frontend tests

Learn best practices on creating frontend tests, testing on-premise apps, integrating tests into your CI/CD pipeline, and using Datadog’s testing tunnel.

Download The Guide

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs