AISP ASEAN Bug Bounty 2024 – Beta Edition

AiSP ASEAN Bug Bounty is an initiative to enhance cybersecurity in Southeast Asia. We invite participants to identify vulnerabilities within digital systems and applications.

With exciting target platforms such as SIT’s Campus as a Living Lab (CaLL) network infrastructure, Web3.0 smart contracts and Metaverse virtual environments, join us in shaping the cybersecurity landscape of Southeast Asia!

• Open to local (Singapore) & ASEAN Participants
• Multiple categories: Number, Complexity, Judges Choice

Click here to register.

Direct the queries to this email: [email protected]


Terms & Condition
Commencement and Duration

• Date & Time: 20th July (Saturday), 9.00AM to 5.00PM GMT+8
• For participants: virtual participation via VPN connection
• The organizers may adjust the event duration at their discretion.
• VPN credentials will be provided for virtual participation.

Conduct and Rules

• Adhere to ethical hacking standards ,no malicious activity.
• Join official channels for updates, report technical issues immediately.
• Use legal tools, no external assistance.
• Submit all vulnerabilities through the official platform with detailed descriptions and impact.
• All submissions must be completed within the event timeframe.
• Breach of rules or unethical behaviour will result in disqualification.
• Keep sensitive information confidential until authorized for public disclosure.
• Comply with all laws and regulations.
• Organizers are not liable for any damage or harm arising from participation.
• Only test systems and networks identified during the briefing session; DDoS attacks are forbidden.
• No financial compensation for expenses during the event.

IMPORTANT NOTE: Vulnerabilities/security flaws discovered by participants during the Bug Bounty belong to the organisers.

By participating, you agree to abide by these Terms & Conditions, Conduct, and Rules. The organisers reserve the right to modify these terms at any time.


ORGANISED BY

SUPPORTED BY:



IN PARTNERSHIP WITH: