AlphaPrism
New PairsTrendingGainersVolume
Sign in

Product

  • New Pairs
  • Trending
  • Gainers
  • Volume

For projects

  • How rug score works
  • Claim your token
  • Public API
  • Telegram bot

Legal

  • Terms of Service
  • Privacy Policy
  • Disclaimer
  • Security

Connect

  • @Alphaprismbot
  • GitHub
  • Twitter / X
  • Health
AlphaPrism · One prism, every chain.·Built on Kaspa ·Not affiliated with the Kaspa Foundation.
Not financial advice. Rug scores are heuristic; always DYOR.

Security

Responsible disclosure

Found a vulnerability? Please report it privately before public disclosure. We value responsible reporters and will credit you if you like (subject to your consent).

Contact: @Alphaprismbot on Telegram
Preferred: encrypted DM with PoC + expected severity
Response target: acknowledgement within 48 h

In scope

  • alphaprism.it.com and all its subdomains
  • The public HTTP API under /api/*
  • The WebSocket gateway at /ws
  • The Telegram bot @Alphaprismbot (unauth'd command surface only)
  • Any rug-score false-positive or false-negative that looks exploitable by a malicious token deployer

Out of scope

  • Third-party services we consume (CoinGecko, Blockscout, twitterapi.io, Igra / Kasplex RPCs, Kaspa API).
  • Missing best-practice headers that don't unlock a concrete attack.
  • Clickjacking on pages without sensitive state change.
  • Rate-limit bypass on public read-only endpoints (we expect and budget for this).
  • Self-XSS requiring the user to paste into devtools.
  • Social engineering of AlphaPrism staff.

What gets priority

  1. Authentication bypass (SIWE replay, nonce reuse, admin role escalation).
  2. Server action IDOR (toggling alerts or watchlist items for other users).
  3. Rug-score manipulation — any on-chain pattern that forges a fake +bonus on a genuinely rug-risk token.
  4. SQL / command injection, SSRF, RCE.
  5. Cross-user data leakage via the realtime gateway.

Safe harbour

Acting in good faith under this policy, we will not pursue legal action for testing. Please: don't access data beyond what's needed to prove the issue, don't degrade service for other users, and don't publicly disclose until we've had 90 days or a fix has shipped — whichever comes first.

Machine-readable

A /.well-known/security.txt is served with canonical contact details.