red rocks sky cloud tower

SECURITY

BUILD YOUR KINGDOM. WE’LL SECURE IT.

Traders come to The Funded Trader to build their kingdom. That’s why we invest in leading technology and data security infrastructure, protocols, and programs to ensure their kingdoms are as secure as possible.

Each year, we conduct a full-scale penetration test and vulnerability scan that catches potential security vulnerabilities.

We also offer a Vulnerability Disclosure Program where we empower our community to submit any potential security issues we may have missed and receive a possible bounty reward in exchange. Learn more about our Vulnerability Disclosure Program below.

REPORT A SECURITY VULNERABILITY

Vulnerability Disclosure Guidelines

The Funded Trader is a rapidly growing and security-driven company. We believe in delivering our Trading technology with the least risk and threat associated with each public-facing TFT resource/service.

If you are interested in finding technical application and workflow issues that can be exploited, we appreciate your help. We recommend submitting such issues as soon as possible.

Our team will investigate the security reports and resolve the issue within a reasonable time frame. We may offer a monetary bounty for legitimate security reports based on their severity, complexity, and impact as a token of appreciation.

Breach of our program’s terms

The expectation is to respect all the terms and conditions of The Funded Trader’s Bug Bounty Program. Non-adherence or non-compliance will lead to disqualification. A serious breach may also lead to suspension of the Demo Account and existing access controls.

The Funded Trader’s Vulnerability Disclosure Policy

Vulnerability Disclosure Philosophy

The Funded Trader believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between The Funded Trader and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of The Funded Trader customers, products, and services.

Security Researchers

The Funded Trader accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. The Funded Trader defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.

SCOPE

This policy applies to any digital assets owned, operated, or maintained by The Funded Trader, including public facing websites.

Our Commitment to Researchers

  • Trust. We request that you communicate about potential vulnerabilities in a responsible manner, providing sufficient time and information for our team to validate and address potential issues.
  • Respect. We request that researchers make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing.
  • Transparency. We request that researchers provide the technical details and background necessary for our team to identify and validate reported issues, using the form below.
  • Common Good. We request that researchers act for the common good, protecting user privacy and security by refraining from publicly disclosing unverified vulnerabilities until our team has had time to validate and address reported issues.

What we ask to researchers

  • Trust. We maintain trust and confidentiality in our professional exchanges with security researchers.
  • Respect. We treat all researchers with respect and recognize your contribution for keeping our customers safe and secure.
  • Transparency. We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy.
  • Common Good. We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.

Vulnerability reporting

The Funded Trader believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency
and common good between The Funded Trader and Security
Researchers. Together, our vigilant expertise promotes the continued security and privacy of The Funded Trader customers, products, and services.

Submission Form

4rd-section FooterBg