Skip to content

Commit

Permalink
Update info.json files
Browse files Browse the repository at this point in the history
  • Loading branch information
guidanoli committed Sep 16, 2024
1 parent 5565361 commit 5fa8746
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion tests/bounties/src/busybox/info.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{
"description": "Find bugs in BusyBox, a software suite that provides several Unix utilities!\n\nDid you know it is one of the most downloaded software in Docker Hub, with more than one billion downloads?\n\nSubmitted shell code will run inside a BusyBox with only ash utility enabled, to win this bounty the shell code must crash it.\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/busybox-bounty",
"description": "Find bugs in BusyBox, a software suite that provides several Unix utilities!\n\nDid you know it is one of the most downloaded software in Docker Hub, with more than one billion downloads?\n\nSubmitted shell code will run inside a BusyBox with only ash utility enabled, to win this bounty the shell code must crash it.\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/src/busybox",
"imgLink": "https://uawartifacts.blob.core.windows.net/upload-files/Busy_Box_c74c024d34.svg"
}
2 changes: 1 addition & 1 deletion tests/bounties/src/lua/info.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{
"description": "Find bugs in Lua, a powerful, efficient, lightweight, embeddable scripting language!\n\nSubmitted Lua code will run inside a sanboxed Lua environment, to win the bounty the code must crash its interpreter or escape the sandbox and exit with segmentation fault status (code 139).\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/lua-bounty",
"description": "Find bugs in Lua, a powerful, efficient, lightweight, embeddable scripting language!\n\nSubmitted Lua code will run inside a sanboxed Lua environment, to win the bounty the code must crash its interpreter or escape the sandbox and exit with segmentation fault status (code 139).\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/src/lua",
"imgLink": "https://upload.wikimedia.org/wikipedia/commons/c/cf/Lua-Logo.svg"
}
2 changes: 1 addition & 1 deletion tests/bounties/src/solc/info.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{
"description": "Find bugs in Solidity, the most popular programming language for smart contracts!\n\nSubmit Solidity code and try to crash the compiler exit with a segmentation fault status (code 139).\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/solidity-bounty",
"description": "Find bugs in Solidity, the most popular programming language for smart contracts!\n\nSubmit Solidity code and try to crash the compiler exit with a segmentation fault status (code 139).\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/src/solidity",
"imgLink": "https://docs.soliditylang.org/en/v0.8.27/_static/img/logo-dark.svg"
}
2 changes: 1 addition & 1 deletion tests/bounties/src/sqlite/info.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{
"description": "Find bugs in SQLite, the most used database engine in the world!\n\nSubmitted SQL code will run inside a SQLite safe shell open on an empty database, to win the bounty the SQL code must crash the SQLite shell.\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/sqlite-bounty",
"description": "Find bugs in SQLite, the most used database engine in the world!\n\nSubmitted SQL code will run inside a SQLite safe shell open on an empty database, to win the bounty the SQL code must crash the SQLite shell.\n\nThe source code of the bounty can be inspected at:\nhttps://github.com/crypto-bug-hunters/bug-buster/tree/main/tests/bounties/src/sqlite",
"imgLink": "https://www.svgrepo.com/show/374094/sqlite.svg"
}

0 comments on commit 5fa8746

Please sign in to comment.