Hibiki Run Whitepaper v3.0
  • Welcome
    • ๐Ÿ‘‹Introduction
    • ๐Ÿ”ฐGetting started
    • โ“FAQ
    • ๐ŸŒŽMulti-language whitepaper (unofficial)
  • How it works
    • ๐Ÿ†“Free-to-play
    • ๐Ÿ’ณIn-app wallets
    • ๐ŸŽถGamified music discovery
    • ๐ŸŽฒRaffle machine
    • ๐ŸงญNFT staking
    • ๐Ÿ›’Marketplace
    • ๐ŸฅทAnti-exploitation system
    • ๐ŸŽฎHeadphones game mechanics
      • Mint
      • Charge
      • Remix
      • Level Up
      • Stamina
      • Raffle
      • Daily HUT earning cap
      • Cool-down & Restrictions
    • ๐ŸŒŠThe EchoSystem
      • Hibiki Echo infusion for R.H. staking
    • ๐Ÿ’ฐHibiki Run Affiliate Program
  • Game assets
    • ๐ŸŽงHeadphones
    • ๐Ÿ€Omamori
    • ๐Ÿ‘œPouch
    • ๐ŸŽŠGachapon
  • Digital collectibles
    • ๐ŸณExternal NFT projects
    • ๐Ÿง‘โ€๐ŸŽจHBK Artists/Musicians
    • ๐ŸฅšGachapon for partner projects/creators
  • Tokenomics
    • ๐Ÿช™$HUT and $HBK
    • โ›ฒToken Consumptions
      • Charge
      • Mint
      • Omamori fusion
      • Remix
      • Level up
      • Wear Omamori
      • Reduce CD
      • PFP + Headphone fusion (under development)
      • Raffle
    • โš“Allocation and vesting
    • ๐Ÿ’ฒTransaction costs
  • Others
    • ๐Ÿ”’Security
    • ๐Ÿง‘โ€๐Ÿ’ปLog
Powered by GitBook
On this page
  • Fair use
  • Bug bounty

Was this helpful?

  1. Others

Security

Lock in your tunes and keep the beat secure!

Fair use

Security is a top priority at Hibiki Run. We take the protection of our usersโ€™ data and assets very seriously, and have implemented a comprehensive security system to ensure that our platform is safe and secure.

In order to maintain a secure environment, it is important that all users engage in fair use of the Hibiki Run app and WebUI. We ask that users do not engage in any activities that may compromise the security of the platform or other users. This includes but is not limited to

  • Using aggressive automation tools in scenarios such as marketplace to gain an overwhelmingly unfair advantage over other players

  • Exploiting software bugs or vulnerabilities for personal gain

  • Engaging in fraudulent activities such as phishing or scamming other users

  • Engaging in activities that disrupt the normal functioning of the app or platform, such as DDoS attacks or other types of hacking attempts

  • Impersonating other users or engaging in other forms of identity theft

We have developed and implemented an Automated Detection System that enables us to identify and seize accounts involved in Malicious and Damaging activities towards the Hibiki Run Ecosystem. These activities include the scenarios listed below:

  • The use of a single IP/Device to register a significant number of accounts

  • The use of Temporary Emails

  • Automated Transactions

  • Automated Running Sessions

In the event that a user is found to be engaging in malicious activities, such as spamming with unreasonable requests, we may take action to temporarily ban the user for a period of 24-48 hours, or indefinitely depending on the severity.

Bug bounty

We welcome every user to become our manual testers and report bugs found in the app.

However, it is mandatory that potential penetration testers seek pre-approval before performing any testing (including but not limited to network and web application testing, social engineering, vulnerability scanning, and exploitation frameworks). This will ensure that the test is conducted legally and ethically, and will also prevent any disruption to business operations. It is important to allow at least 24 hours for pre-approval to be obtained, as the process may involve multiple stakeholders and security reviews.

Reward system for bug bounty will be disclosed in due course.

PreviousTransaction costsNextLog

Last updated 1 year ago

Was this helpful?

๐Ÿ”’