Determine whether a bug bounty applies
If your finding is eligible for a reward, submit it through one of the active bug bounty programs rather than emailing directly. Program submissions are the primary path for bounty-eligible reports.
Encrypt sensitive data
If you are emailing a report that contains sensitive technical details, encrypt the message using the PGP public key below before sending.
Send your report
Email your report to security@polygon.technology. Include a description of the vulnerability, steps to reproduce, and any relevant supporting material.