{"id":3205,"date":"2020-10-01T09:08:00","date_gmt":"2020-10-01T09:08:00","guid":{"rendered":"https:\/\/pickyassist.com\/blog\/?p=3205"},"modified":"2026-02-18T07:31:16","modified_gmt":"2026-02-18T07:31:16","slug":"bug-bounty-program-bug-beacon","status":"publish","type":"post","link":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/","title":{"rendered":"Bug Bounty Program &#8211; Bug Beacon"},"content":{"rendered":"\n<p>Our Team of dedicated security professionals works vigilantly to keep Picky Assist platform fortified, Even after our scrutinizing if you happen to come across any security issues you may report the same to our security team. We would be honestly thankful for your help and will be more than happy to offer you a reward for submission of security bugs.<\/p>\n\n\n\n<p>We take security issues with absolute seriousness here at Picky Assist ! <\/p>\n\n\n\n<p>We provide bug bounties for security related subjects \/ findings \/ concerns that are responsibly reported to us. Please read our Rules and Guidelines for bug bounties before you start to hunt.<\/p>\n\n\n\n<p class=\"has-gridlove-bg-color has-gridlove-highlight-bg-background-color has-text-color has-background has-large-font-size\">Majority of the products are either in beta or alpha and rapidly undergoing development and hot fixes so may have functional and UI based bugs however we consider the following category of bugs as serious and offer up to $100 depends on the severity of the bug as listed below;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Qualifying Scope<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Remote Code Execution&nbsp;(RCE)<\/li>\n\n\n\n<li>Data Leakage \/ Theft&nbsp;<\/li>\n\n\n\n<li>Session Hijacking&nbsp;(Not Stored XSS \/ Self XSS)<\/li>\n\n\n\n<li>SQL based Injections&nbsp;<\/li>\n\n\n\n<li>Unauthorized Access to Restricted Area<\/li>\n\n\n\n<li>Server Side Request Forgery<\/li>\n\n\n\n<li>Subdomain\/Domain Takeover<\/li>\n\n\n\n<li>Session Fixation<\/li>\n\n\n\n<li>Improper TLS protection<\/li>\n\n\n\n<li>Directory Traversal<\/li>\n\n\n\n<li>Business Logic Issues<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Scope <\/h2>\n\n\n\n<p>Please see which scope included and not included for the bug bounty program<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td><strong>Domain<\/strong><\/td><td><strong>Eligibility<\/strong> <\/td><\/tr><tr><td>https:\/\/pickyassist.com<\/td><td>Eligible<\/td><\/tr><tr><td>https:\/\/pickyassist.com\/app<\/td><td>Eligible<\/td><\/tr><tr><td>https:\/\/app.pickyassist.com<\/td><td>Eligible<\/td><\/tr><tr><td>https:\/\/pickyassist.com\/beta<br>https:\/\/pickyassist.com\/alpha<\/td><td><meta charset=\"utf-8\">Not Eligible <\/td><\/tr><tr><td>https:\/\/pickyassist.com\/blog<\/td><td>Eligible<\/td><\/tr><tr><td>https:\/\/feedbacks.pickyassist.com<\/td><td>Not Eligible <\/td><\/tr><tr><td>http:\/\/status.pickyassist.com<\/td><td>Not Eligible <\/td><\/tr><tr><td>https:\/\/help.pickyassist.com<\/td><td>Not Eligible <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Reporting <\/h2>\n\n\n\n<p>If you think you have observed an issue we encourage you to report it to us to support@pickyassist.com (in the prescribed mentioned format).<\/p>\n\n\n\n<p class=\"has-gridlove-bg-color has-gridlove-highlight-bg-background-color has-text-color has-background has-large-font-size\">Kindly note our team may not respond if your reporting is not qualified as per our program rules as mentioned in this page<\/p>\n\n\n\n<p class=\"has-large-font-size\"><br><strong>Happy Hunting!!!<\/strong><br><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Rules<\/strong><\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Do not attempt attacks against other users during your research.<\/li>\n\n\n\n<li>Don&#8217;t violate the privacy of other users, destroy data, disrupt our services, etc.<\/li>\n\n\n\n<li>Do not attempt to gain access to another user&#8217;s information or data.<\/li>\n\n\n\n<li>Do not use automated or scanner tools and no DoS or Spam attacks either.<\/li>\n\n\n\n<li>Do not disclose details in public until we patch the issue.<\/li>\n\n\n\n<li>No domains other than https:\/\/pickyassist.com, its Facebook App\/Mobile App\/WAP Site shall be considered or targeted for Security Audits.<\/li>\n\n\n\n<li>Never attempt any non-technical\/social attacks against other users or Picky Assist staff.<\/li>\n\n\n\n<li>Bug disclosure communications with Picky Assist Security Team are to remain confidential. Researchers must destroy all artefact created to document vulnerabilities (POC code, videos, screenshots) after the bug report is closed.<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>What Does Not Qualify?<\/strong><\/h1>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Bugs that are based on UI\/UX or non-functional elements of the product.<\/li>\n\n\n\n<li>Any type of brute force cracking or automated attacks.<\/li>\n\n\n\n<li><strong>Problems that necessitate a significant amount of user interaction and\/or social engineering, such as persuading our clients to click on a link provided by an unknown party.<\/strong><\/li>\n\n\n\n<li>Issues that only affect extensions, plug-ins, or legacy browsers.<\/li>\n\n\n\n<li>Attack vectors that require the use of request interceptor tools or developer tools.<\/li>\n\n\n\n<li>Any issue that has already been reported to us through our bug bounty program.<\/li>\n\n\n\n<li>Vulnerabilities that Picky Assist has determined to be within an acceptable level of operational risk, such as <strong>clickjacking.<\/strong><\/li>\n\n\n\n<li><strong>XSS (or behaviors) that only allow you to attack yourself, such as &#8220;Self XSS&#8221;. This also includes stored XSS situations where you can&#8217;t inject XSS code into other accounts; any self-stored XSS in the same account is not considered for the bug bounty.<\/strong><\/li>\n\n\n\n<li>Any issues targeting our support, blog, or other third-party sites.<\/li>\n\n\n\n<li>CSV injection.<\/li>\n\n\n\n<li>Session invalidation after password change.<\/li>\n\n\n\n<li>Lack of adherence to best security practices that does not lead to a vulnerability.<\/li>\n\n\n\n<li>Absence of security headers that do not directly result in a vulnerability.<\/li>\n\n\n\n<li>Attacks that require physical access to a user device.<\/li>\n\n\n\n<li>Disclosure of server information or files.<\/li>\n\n\n\n<li>Email spoofing and related best practices.<\/li>\n\n\n\n<li>Missing cookie flags on non-authentication cookies.<\/li>\n\n\n\n<li>Missing best practices in DNS configuration (e.g., DKIM\/DMARC\/SPF\/TXT).<\/li>\n\n\n\n<li>Missing best practices in SSL\/TLS configuration.<\/li>\n\n\n\n<li>Missing best practices in Content Security Policy (CSP) or lack of other security-related headers.<\/li>\n\n\n\n<li>Leakage of sensitive tokens (e.g., reset password token) to trusted third parties on a secure connection (HTTPS).<\/li>\n\n\n\n<li>Credential re-usage from public dumps.<\/li>\n<\/ol>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>The Guidelines to Report Bugs<\/strong><strong>.<\/strong><\/h1>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Report shall be explained sequentially with clear specifications so to reproduce the bug and shall be supported with URL, Videos and Screenshots.<\/li>\n\n\n\n<li>Report shall be explained with the impact of bugs in business\/ to users.<\/li>\n\n\n\n<li>Report shall be submitted with the Reporter\u2019s Name, Email ID and other contact details<\/li>\n\n\n\n<li>Report shall be submitted with the details including the Severity and Types of Severity.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended Report Format<\/h3>\n\n\n\n<p><strong>At Glance <\/strong><br>Provide the information at glance <br><br><strong>Severity Index<\/strong><br>Critical \/ High \/ Medium \/ Low <br><br><strong>Proof Of Concept <\/strong><br>Detailed POF with Video or Screencasts <br><br><strong>End Points<\/strong><br>End points which are affected , if server side or backdoor entries kindly mention the server hostname, IP etc<br><br><strong>Steps to Reproduce<\/strong><br>Please give step by step to reproduce the bug<br><br><strong>Picky Assist Registered Email Address<\/strong><br>The account used by you as part of your research <br><br><strong>Impact to Users &amp; Business<\/strong><br>Explain your findings how this can impact users or our business <br><br><strong>Contact Info<\/strong><br>Your Name | Email | Profile <br><br><strong>Send your report to support@pickyassist.com with Subject Contains &#8220;Bug Bounty&#8221; <\/strong><br><\/p>\n\n\n\n<p><strong>Points To Be Noted Before Submitting Report<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Please do report the issue with immediate effect.<\/li>\n\n\n\n<li><strong>Please do not upload your findings in any file sharing website\/youtube as we prefer you to upload the same in Google Drive\/to your private server<\/strong><\/li>\n\n\n\n<li>Please do try to include only one problem per report to avoid complication.<\/li>\n\n\n\n<li>Please do give a try to reproduce the bug at least thrice before writing a bug report.<\/li>\n\n\n\n<li>Please test the same bug occurrence on other modules of similar description.<\/li>\n\n\n\n<li>Please do read the Bug Report before you submit.&nbsp;<\/li>\n<\/ol>\n\n\n\n<blockquote class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201c<strong>Please do conclude the report as the point of reporting a bug is to get bugs fixed\u201d&nbsp;<\/strong><\/p>\n<\/blockquote>\n\n\n\n<div style=\"height:66px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>FAQ<\/strong><\/h1>\n\n\n\n<p><strong>What is the Picky Assist Bug Beacon Program?<\/strong><\/p>\n\n\n\n<p>Our Bug Beacon program provides individuals across the world to submit vulnerability reports in prescribed format but no business other than Picky assist will be qualified. All qualified submissions shall be eligible for a payment. Bounties will be paid out at Picky Assist discretion based on the severity and impact of the vulnerability.&nbsp;<\/p>\n\n\n\n<p><strong>How are bounty payments made?<\/strong><\/p>\n\n\n\n<p>Bounty payments for accepted issues will be sent out to researchers using bank transfer or Paypal. The amount will vary upon the gravity \/ severity of the issues reported.&nbsp;<\/p>\n\n\n\n<p><strong>Will credit be given?<\/strong><\/p>\n\n\n\n<p>Definitely! Once the issue is patched up, we shall publish the details in the PIcky Assist <a href=\"https:\/\/pickyassist.com\/blog\/hall-of-fame\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"&quot;Hall of Fame&quot; (opens in a new tab)\">&#8220;Hall of Fame&#8221;<\/a> page. In addition to that we will include the name and link to the researchers responsible for reporting the issue.<\/p>\n\n\n\n<p><strong>Even after submitting an issue I have not received a response!<br><\/strong><br>You will have to provide and we require at least 2-7 days in getting back to you. We do review each report with utmost care and are required to fully understand the scope of all issues reported by you.<\/p>\n\n\n\n<p><strong>Will Picky Assist offer a job for a Security Auditor \/ for reporting any security related bugs?<\/strong><\/p>\n\n\n\n<p>We\u2019ve always been proactive in offering jobs to researchers who report any security related bugs but they need to sweep through the HR Interview or Tech Team Interview or both, to prove them more proficient. If they are disinterested in the employment system then they can be offered to work with us as freelance security auditors and we may assign them as and when new versions are updated, whereby you can report a bug and be financially compensated.<\/p>\n\n\n\n<p><strong>What is Picky Assist looking for?<\/strong><\/p>\n\n\n\n<p>We are looking for any bug maliciously cracking the security of our users, within the purview of our threat model. Finding bigger bugs brings you closer to bigger rewards (maximum $100 being a self funded startup), but all security related bugs shall be bountied.<br><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>\u201cWe Offer Rewards For Any Security Relevant Bugs. These Comprise Exploits, Vulnerabilities And Any Information About Ongoing Attacks.\u201d<\/strong><\/p>\n<\/blockquote>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our Team of dedicated security professionals works vigilantly to keep Picky Assist platform fortified, Even after our scrutinizing if you happen to come across any security issues you may report the same to our security team. We would be honestly thankful for your help and will be more than happy to offer you a reward [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[116],"tags":[156],"class_list":["post-3205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-picky-assist-bug-bounty"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bug Bounty Program - Bug Beacon - Picky Assist Official Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Bounty Program - Bug Beacon - Picky Assist Official Blog\" \/>\n<meta property=\"og:description\" content=\"Our Team of dedicated security professionals works vigilantly to keep Picky Assist platform fortified, Even after our scrutinizing if you happen to come across any security issues you may report the same to our security team. We would be honestly thankful for your help and will be more than happy to offer you a reward [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/\" \/>\n<meta property=\"og:site_name\" content=\"Picky Assist Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-01T09:08:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-18T07:31:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Danny\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danny\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/\",\"url\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/\",\"name\":\"Bug Bounty Program - Bug Beacon - Picky Assist Official Blog\",\"isPartOf\":{\"@id\":\"https:\/\/pickyassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg\",\"datePublished\":\"2020-10-01T09:08:00+00:00\",\"dateModified\":\"2026-02-18T07:31:16+00:00\",\"author\":{\"@id\":\"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/f7e9e7ef306abb4d9a1b00210e2c86e1\"},\"breadcrumb\":{\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage\",\"url\":\"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg\",\"contentUrl\":\"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg\",\"width\":600,\"height\":327,\"caption\":\"bug-bounty\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pickyassist.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bug Bounty Program &#8211; Bug Beacon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pickyassist.com\/blog\/#website\",\"url\":\"https:\/\/pickyassist.com\/blog\/\",\"name\":\"Picky Assist Official Blog\",\"description\":\"Picky Assist Official Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pickyassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/f7e9e7ef306abb4d9a1b00210e2c86e1\",\"name\":\"Danny\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/83c616c1e62e9b2f2177e7b029b7270bea92cfe313402e298ee4c0fa0e05a951?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/83c616c1e62e9b2f2177e7b029b7270bea92cfe313402e298ee4c0fa0e05a951?s=96&d=mm&r=g\",\"caption\":\"Danny\"},\"url\":\"https:\/\/pickyassist.com\/blog\/author\/adminreji_blog\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Bounty Program - Bug Beacon - Picky Assist Official Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/","og_locale":"en_US","og_type":"article","og_title":"Bug Bounty Program - Bug Beacon - Picky Assist Official Blog","og_description":"Our Team of dedicated security professionals works vigilantly to keep Picky Assist platform fortified, Even after our scrutinizing if you happen to come across any security issues you may report the same to our security team. We would be honestly thankful for your help and will be more than happy to offer you a reward [&hellip;]","og_url":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/","og_site_name":"Picky Assist Official Blog","article_published_time":"2020-10-01T09:08:00+00:00","article_modified_time":"2026-02-18T07:31:16+00:00","og_image":[{"width":600,"height":327,"url":"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg","type":"image\/jpeg"}],"author":"Danny","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Danny","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/","url":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/","name":"Bug Bounty Program - Bug Beacon - Picky Assist Official Blog","isPartOf":{"@id":"https:\/\/pickyassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage"},"image":{"@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage"},"thumbnailUrl":"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg","datePublished":"2020-10-01T09:08:00+00:00","dateModified":"2026-02-18T07:31:16+00:00","author":{"@id":"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/f7e9e7ef306abb4d9a1b00210e2c86e1"},"breadcrumb":{"@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#primaryimage","url":"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg","contentUrl":"https:\/\/pickyassist.com\/blog\/wp-content\/uploads\/2020\/10\/bug-bounty.jpg","width":600,"height":327,"caption":"bug-bounty"},{"@type":"BreadcrumbList","@id":"https:\/\/pickyassist.com\/blog\/bug-bounty-program-bug-beacon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pickyassist.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bug Bounty Program &#8211; Bug Beacon"}]},{"@type":"WebSite","@id":"https:\/\/pickyassist.com\/blog\/#website","url":"https:\/\/pickyassist.com\/blog\/","name":"Picky Assist Official Blog","description":"Picky Assist Official Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pickyassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/f7e9e7ef306abb4d9a1b00210e2c86e1","name":"Danny","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pickyassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/83c616c1e62e9b2f2177e7b029b7270bea92cfe313402e298ee4c0fa0e05a951?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/83c616c1e62e9b2f2177e7b029b7270bea92cfe313402e298ee4c0fa0e05a951?s=96&d=mm&r=g","caption":"Danny"},"url":"https:\/\/pickyassist.com\/blog\/author\/adminreji_blog\/"}]}},"_links":{"self":[{"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/posts\/3205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/comments?post=3205"}],"version-history":[{"count":19,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/posts\/3205\/revisions"}],"predecessor-version":[{"id":7431,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/posts\/3205\/revisions\/7431"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/media\/3401"}],"wp:attachment":[{"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/media?parent=3205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/categories?post=3205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pickyassist.com\/blog\/wp-json\/wp\/v2\/tags?post=3205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}