Xc0mrade Technologies Private Limited — Version 1.0
These General Conditions of Use ("GCU") govern the relationship between Xc0mrade Technologies Private Limited, a company incorporated under the Companies Act, 2013 with CIN U62099BR2025PTC079540, having its registered office in Bihar, India ("Xc0mrade" or the "Company") and any individual or entity registering on the Company's platform accessible at https://xc0mrade.com (the "Platform").
The Platform is a multi-sided vulnerability marketplace that enables organizations to discover security vulnerabilities in their digital assets through structured programs offered by Security Researchers. The Platform provides five (5) types of services: (i) Bug Bounty Programs, (ii) Vulnerability Disclosure Programs (VDP), (iii) Penetration Test Management (PTM), (iv) Attack Surface Management (ASM), and (v) Community Learning and Skill Development (zerod). Together these are referred to as the "Services".
Capitalized terms used herein shall have the meanings assigned below:
Registration on the Platform is restricted to individuals who have attained the age of majority (18 years or older) under the applicable laws of their country of residence. By registering, you represent and warrant that you meet this requirement. The Company reserves the right to request proof of age at any time.
Security Researchers are independent individuals or entities. Nothing in these GCU creates or shall be construed to create any employer-employee relationship, agency, partnership, joint venture, or any other form of association between the Company and a Security Researcher. Security Researchers are solely responsible for their own tax obligations, social security contributions, professional registrations, and compliance with applicable Indian and international laws.
Individuals accessing the Platform on behalf of a Customer represent and warrant that they have full authority to bind the Customer to these GCU. All actions taken by Customer Users on the Platform are deemed to be actions of the Customer itself.
Security Researchers must proactively disclose and avoid conflicts of interest with Customers whose Programs they participate in. Conflicts include but are not limited to: (i) current or former employment with the Customer within 12 months; (ii) holding a financial interest in the Customer; (iii) being a contractor or vendor of the Customer. Participation in a Program where a conflict exists is prohibited unless expressly authorized in writing by the Customer.
To access the Services, Users must complete the registration process on the Platform by providing accurate, complete, and current information. Users must select their account type at registration: Security Researcher or Organization. Additional role types (Mentor, ECS Reviewer, Vendor, Admin) are assigned by the Company.
Users are solely responsible for maintaining the confidentiality of their login credentials. Any activity occurring under a User's account is deemed to be the User's own action. Users must immediately notify the Company at security@xc0mrade.com upon discovering any unauthorized access to or use of their account.
Security Researchers wishing to receive monetary rewards must complete KYC verification as mandated by Indian financial regulations including the Prevention of Money Laundering Act (PMLA), 2002 and applicable RBI guidelines. KYC verification requires submission of government-issued photo identification, proof of address, and applicable tax documentation (PAN card for Indian residents). Payouts are strictly suspended until KYC is verified and marked as "KYC Verified" on the Platform.
The Company reserves the right to suspend or permanently terminate any User account for: (i) violation of these GCU; (ii) suspected or confirmed fraudulent activity; (iii) submission of false or misleading information; (iv) actions that compromise Platform security or integrity; (v) conduct harmful to Customers, other Users, or the Company. Termination is without prejudice to the Company's right to seek damages.
Bug Bounty Programs enable Customers to invite Security Researchers (publicly or privately) to test designated Systems in exchange for monetary Rewards. Security Researchers participating in Bug Bounty Programs acknowledge that:
VDPs are non-monetary programs enabling Security Researchers to responsibly report Vulnerabilities to organizations. VDP participants receive no financial Reward and do not earn Sketch Score ranking points. Participation demonstrates good faith security research and supports the broader cybersecurity community.
PTM services allow Customers to manage structured penetration testing engagements through the Platform. Security Researchers participating in PTM engagements operate under a separate written agreement with the Customer and are subject to stricter confidentiality and scope requirements. PTM participants may be subject to background verification at the Company's discretion.
ASM is a Customer-facing continuous monitoring service. ASM findings are generated through automated scanning and must be validated by Customer Users before they are classified as confirmed Vulnerabilities. Security Researchers are not directly involved in ASM delivery.
The zerod module provides Security Researchers with access to: (i) Capture The Flag (CTF) challenges; (ii) structured certification pathways; (iii) anonymized vulnerability case studies; (iv) mentorship programs. Participation in zerod activities contributes to a Researcher's Sketch Score through achievement of defined milestones. zerod content is the intellectual property of the Company and may not be reproduced or distributed without written permission.
The Sketcher is the Platform's proprietary tool for creating structured visual representations of vulnerability exploit chains. By submitting a Sketch as part of a Vulnerability Report, the Security Researcher:
Security Researchers may only conduct Tests on Systems expressly listed as in-scope in an active Program. The Customer's Program rules, read together with these GCU, constitute the binding Safe Harbor authorization for testing. Any testing conducted outside defined scope may constitute an offence under Section 66 of the Information Technology Act, 2000 and could result in civil or criminal liability.
Security Researchers must not, under any circumstances:
Upon discovering a Vulnerability, Security Researchers must submit the Vulnerability Report through the Platform within a reasonable timeframe. Disclosure timelines are governed by the Program rules and must not exceed the Customer's defined remediation period. Where no timeline is specified, the Company's default disclosure policy of 90 days from report acknowledgment applies.
High-quality Vulnerability Reports must include: (i) a clear, descriptive title; (ii) the affected target or endpoint; (iii) the Security Researcher's severity assessment with CVSS justification; (iv) a detailed description of the Vulnerability; (v) quantified impact assessment; (vi) step-by-step reproduction instructions; and (vii) where applicable, a Sketcher-generated visual exploit chain. Low-quality, non-reproducible, or incomplete reports will result in Sketch Score deductions as per Schedule A.
The Company retains all intellectual property rights in the Platform, including but not limited to the Sketcher tool, Sketch Score algorithm, P-Tier system, zerod content, software, code, UI/UX design, databases, trademarks, and all proprietary methodologies. Users may not reproduce, adapt, distribute, or create derivative works from any Platform materials without prior written consent.
Upon acceptance of a Vulnerability Report and payment of the associated Reward, the Security Researcher grants the Customer a non-exclusive, worldwide, perpetual, royalty-free license to use the Vulnerability Report (including reproduction steps and supporting materials) for internal security remediation, verification, audit, and compliance purposes.
The Security Researcher warrants that: (i) they are the sole author of the Report; (ii) the Report does not infringe any third-party rights; and (iii) the Report does not contain any open-source, third-party, or pre-existing IP without appropriate disclosure.
For clarity: assignment of rights applies only to the specific Sketch artifact generated and submitted for that accepted report. The underlying security know-how, methodology, and general research techniques remain with the Security Researcher.
Aggregated, anonymized, and statistical data generated through Platform usage, including Sketch Score data, program metrics, and vulnerability trends, is the exclusive property of the Company. Users have no ownership rights in Platform Data and may not extract, scrape, or reproduce it without written permission.
Rewards are determined solely by the Customer based on the severity of the Vulnerability (as agreed between the Customer and Security Researcher) and the Program's reward table. The Company acts strictly as an intermediary and payment facilitator and is not liable for the non-payment, under-payment, or dispute of any Reward.
The Company charges a platform commission on each Reward paid through the Platform. The commission rate applicable to each Program type is specified in the Customer's subscription agreement. Commissions are charged to the Customer as an overhead and are not deducted from the Security Researcher's Reward unless explicitly stated in the Program.
Rewards are held in the Security Researcher's Platform Wallet pending KYC verification and payout processing. Payouts are processed through the Platform's authorized PSP (Razorpay for Indian transactions; Stripe Connect / Payoneer for international). Currency conversion charges, where applicable, are borne by the Security Researcher. The Company shall provide Security Researchers with an annual transaction summary for tax reporting purposes.
Security Researchers who are Indian residents are solely responsible for compliance with applicable Indian tax laws. The Company may deduct Tax at Source (TDS) as required under the Income Tax Act, 1961:
The Company has obtained professional tax advice on classification and may update implementation as required by law. Security Researchers should obtain independent tax advice regarding their individual obligations (including GST where applicable).
By accepting these GCU, Security Researchers expressly authorize the Company to generate and issue invoices on their behalf for Rewards earned through Bug Bounty Programs. Security Researchers certify that they are aware of and will comply with all applicable social, tax, and accounting obligations. The Company's liability is strictly limited to providing transaction documentation.
All Users agree to maintain strict confidentiality of all information accessed through or in connection with the Platform, including Vulnerability Reports, Program details, Customer technical information, and any data encountered during testing. Confidentiality obligations survive termination of these GCU for a period of five (5) years.
Upon closure of a Program or termination of participation, Security Researchers must immediately delete all Customer data and information from their systems and, upon request, provide written confirmation of such deletion.
The Company processes personal data of Users as a data controller under India's Digital Personal Data Protection Act (DPDP), 2023. Details of data processing activities are available in the Platform's Privacy Policy at https://xc0mrade.com/privacy.
Personal data collected from Security Researchers (including KYC documents, PAN details, transaction records) is processed strictly for the purposes of: (i) Platform operation and identity verification; (ii) Reward disbursement; (iii) legal compliance; and (iv) Sketch Score calculation. Data is not shared with third parties except as required by law or for payment processing.
Security Researchers may encounter personal data belonging to Customer users during testing. Security Researchers must not access, copy, modify, or retain such data beyond what is strictly necessary to demonstrate the Vulnerability. All personal data encountered must be immediately reported to the Customer and treated as strictly confidential. Non-compliance constitutes a serious breach of these GCU and may trigger obligations under the DPDP Act 2023 and the IT Act 2000.
Users may exercise their rights under the DPDP Act 2023 (including the right to access, correct, and erase personal data) by writing to: privacy@xc0mrade.com. The Company will respond within the timeframes mandated by applicable law.
To the maximum extent permitted by applicable Indian law, the Company shall not be liable for:
Security Researchers are fully liable for all damage caused to the Company, Customers, or third parties resulting from: (i) testing conducted outside Program scope; (ii) unauthorized data access or exfiltration; (iii) breach of confidentiality; (iv) submission of false or malicious reports; or (v) any violation of applicable Indian or international law. Security Researchers agree to indemnify and hold harmless the Company and Customers from all claims, damages, costs, and expenses arising from such breaches.
Customers are solely responsible for the accuracy and completeness of their Program scope definitions, the security of their own Systems, and ensuring that Security Researchers have lawful authorization to test designated assets. The Company shall not be liable for any damage arising from inadequately defined Program scopes.
The Platform's Safe Harbor provisions are the critical legal instrument enabling authorized security research in India. Authorization matters because Section 43 of the Information Technology Act, 2000 distinguishes unauthorized access from authorized access, and Section 66 addresses criminal consequences for dishonest/fraudulent unauthorized acts.
By publishing a Program on the Platform, a Customer expressly grants Security Researchers authorization to conduct Tests within the defined scope. This authorization transforms the activity from potentially unlawful unauthorized access under Section 43/66 of the IT Act, 2000 into authorized, consented security research. It also supports responsible disclosure and compliance under applicable cybersecurity and privacy frameworks including the DPDP Act 2023.
Safe Harbor protection is strictly conditional on compliance with Program rules and these GCU. Testing outside scope voids all protections immediately.
The Company operates as an "Intermediary" under Section 2(w) of the Information Technology Act, 2000 and is subject to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 as amended. In this capacity, the Company:
Failure to maintain Intermediary compliance obligations, including the 72-hour takedown requirement for notified unlawful content, results in loss of safe harbor immunity under the IT Act. All Users must cooperate with the Company's compliance obligations.
The Platform operates a three-tier reputation system based on Sketch Score (SS):
Sketch Score points are awarded and deducted automatically based on report outcomes as detailed in Schedule A. The Company reserves the right to modify the P-Tier thresholds, point values, and tier privileges with 30 days' notice to affected Users. All high-stakes P-Tier decisions (P1 promotions and demotions) are subject to mandatory human review.
P-Tier status constitutes a professional endorsement and is linked to recruitment pathways. Manipulation of the Sketch Score system through fraudulent submissions is a serious violation resulting in permanent account termination.
In the event of a personal data breach affecting your data, Xc0mrade will notify affected Data Principals and the Data Protection Board of India within 72 hours of becoming aware of the breach, in accordance with applicable DPDP Rules.
Such notice will include, to the extent reasonably available at the time: (i) nature of the breach; (ii) likely consequences; and (iii) mitigation/remedial measures taken or proposed.
These GCU are governed exclusively by the laws of India. Any dispute, controversy, or claim arising out of or relating to these GCU, or its breach, termination, or validity, shall be subject to the following resolution process:
The Company reserves the right to modify these GCU at any time. Users will be notified of material changes upon next login and required to re-accept. Continued use of the Platform after the effective date of changes constitutes acceptance. If you do not agree, you must immediately cease using the Platform and deactivate your account.
Neither party shall be liable for delays or failures in performance resulting from causes beyond its reasonable control, including acts of God, natural disasters, pandemic, war, cyberattacks on infrastructure, or government actions.
If any provision of these GCU is found to be invalid or unenforceable, the remaining provisions shall continue in full force and effect.
These GCU, together with the Privacy Policy and any Program-specific rules, constitute the entire agreement between the parties regarding Platform use and supersede all prior agreements on the same subject matter.
For all queries, notices, and complaints: legal@xc0mrade.com | grievance@xc0mrade.com
Xc0mrade Technologies Private Limited | CIN: U62099BR2025PTC079540 | Bihar, India
The following points are automatically applied to a Security Researcher's Sketch Score upon report status change:
| Report Outcome | Sketch Score Change |
|---|---|
| Resolved — Critical severity | +50 SS |
| Resolved — High severity | +30 SS |
| Resolved — Medium severity | +15 SS |
| Resolved — Low severity | +7 SS |
| Resolved — Informational | +3 SS |
| Accepted / Triaged | +7 SS |
| Marked as Duplicate | -5 SS |
| Rejected / Informational | -10 SS |
| Confirmed Spam / Malicious | Score zeroed to 0 |
| Ethics training completed | +5 SS |
| Mentor session completed | +3 SS |
| CTF challenge completed (zerod) | +2 to +10 SS |
Sketch Score cannot fall below 0. Score zeroing applies only on confirmed spam or malicious activity as determined by the Trust & Safety team.
Before accessing P2 and P1 programs and before receiving any Reward payment, Security Researchers must complete and certify the following:
I, the undersigned Security Researcher, certify that:
This certification is electronically accepted upon Platform registration and renewed annually or upon material GCU amendments.
— End of Document —
Xc0mrade Technologies Private Limited