DEV Community

Cover image for Web vulnerability bounty rules update
TECNO Security
TECNO Security

Posted on • Edited on

2

Web vulnerability bounty rules update

TECNO Security Response Center respects and thanks all security researchers for their contribution to TECNO security and for helping TECNO improve the security of its products and business. We will carefully evaluate every report and protect the interests of all security researchers to the greatest extent possible.

➡️Vulnerability Scope
Core Business

➡️General Business

  • security.tecno.com
  • tspot.tecno.com
  • www.carlcare.com
  • pcconnection.online
  • nebulalive.com
  • transsion-os.com
  • transsion-message.com
  • vishavideo.com
  • palm.tech

Bounty Reward

Image description

More details: TECNO Web Security Vulnerability Reward Rules V4.0

AWS Security LIVE! Stream

Streaming live from AWS re:Inforce

What’s next in cybersecurity? Find out live from re:Inforce on Security LIVE!

Learn More

Top comments (0)

ACI image

ACI.dev: Fully Open-source AI Agent Tool-Use Infra (Composio Alternative)

100% open-source tool-use platform (backend, dev portal, integration library, SDK/MCP) that connects your AI agents to 600+ tools with multi-tenant auth, granular permissions, and access through direct function calling or a unified MCP server.

Check out our GitHub!