• EnglishFrenchPortugueseSpanish
  • Build your kingdom. We’ll secure it.

    Traders come to The Funded Trader to build their kingdom. That’s why we invest in leading technology and data security infrastructure, protocols, and programs to ensure their kingdoms are as secure as possible. Each year, we conduct a full-scale penetration test and vulnerability scan that catches potential security vulnerabilities. We also offer a Vulnerability Disclosure Program where we empower our community to submit any potential security issues we may have missed and receive a possible bounty reward in exchange. Learn more about our Vulnerability Disclosure Program below.

    Report a Security Vulnerability

    Vulnerability Disclosure Guidelines

    The Funded Trader is a rapidly growing and security-driven company. We believe in delivering our trading technology with the least risk and threat associated with each public-facing TFT resource/service.

    If you are interested in finding technical application and workflow issues that can be exploited, we appreciate your help. We recommend submitting such issues as soon as possible.

    Our team will investigate the security reports and resolve the issue within a reasonable time frame. We offer a monetary bounty for legitimate security reports based on their severity, complexity, and impact via the BugCrowd platform as a token of appreciation.


    • Adherence to TFT’s Disclosure Policy
    • Provide necessary assistance to Branch to replicate the issue and mitigate relevant security issues.
    • Automated tool’s vulnerability reports are not accepted as a valid submission
    • Intensive automated scans must not negatively impact any or all of TFT’s services availability.
    • Automated vulnerability scanning tools or scanned reports are prohibited.
    • In the case of duplicate reports, the first report would be considered a valid submission.
      • Do not intentionally harm the experience or usefulness of the service to others, including degradation of services and denial of service attacks.
      • Do not attempt to view, modify, or damage data belonging to others.
      • Do not disclose the reported vulnerability to others until we’ve had reasonable time to address it.
      • Do not attempt to gain access to another users account or data.
      • Do not attempt non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.

    Breach of our program's terms

    The expectation is to respect all the terms and conditions of The Funded Trader's Bug Bounty Program. Non-adherence or non-compliance will lead to disqualification. A serious breach may also lead to suspension of the account and existing access controls.


    Funded Account Disclaimer

    Hypothetical or simulated performance results have certain limitations. Unlike an actual performance record, simulated results do not represent actual trading. Also, because the trades have not actually been executed, the results may have under-or-over compensated for the impact, if any, of certain market factors, such as lack of liquidity. Simulated trading programs, in general, are also subject to the fact that they are designed with the benefit of hindsight. No representation is being made that any account will or is likely to achieve profit or losses similar to those shown. Funded Account Disclaimer

    1The Funded Trader funded accounts are not live trading accounts, they are fully simulated accounts utilizing real market quotes from liquidity providers.

    The Traders featured are representative only and includes selected traders who allow their names to be publicly disclosed. Trader performance quoted represents past performance in a simulated environment and does not guarantee current or future performance. Further, financial instrument trading involves substantial risk of loss and is not suitable for every investor, trading activities referenced by or undertaken utilizing The Funded Trader may not be suitable for all persons.

    Enter your keyword