A Bug Bounty

Leaderboard

Name Number of Submissions Credit (BC)
wws22593 11 \(11 \cdot2^{0}\)
wws22547 7 \(7 \cdot2^{0}\)
wws18024 5 \(5 \cdot2^{0}\)
mgs15616 2 \(4 \cdot2^{0}\)
wws22554 3 \(3 \cdot2^{0}\)
wws15344 2 \(2 \cdot2^{0}\)
wws21073 1 \(1 \cdot2^{0}\)
wws16924 1 \(1 \cdot2^{0}\)
wws22488 1 \(1 \cdot2^{0}\)

What is this?

A bug bounty program is a crowdsourcing initiative that rewards individuals for discovering and reporting errors. It is frequently used by big companies such as Google, Facebook or Microsoft to attract hackers and security researchers to test their websites and platforms for security vulnerabilities. However, this bug bounty program here is inspired by the one initiated by Donald E. Knuth, where he rewards people when they find errors in his books.

Every course and class member is encouraged to participate in the CSWR Bug Bounty program and report typographic errors, code problems or logic flaws in this course websites. Reporting an error is easy and can be done by sending a screenshot and a brief explanation of the error via email to . The person who first submits an error receives the reward, that ranges from 2^0 to 2^7 Bug Credits (BC) and will be added to the leaderboard. Typographic errors are always rewarded with 2^0 BC each. Bugs in the R code or flaws in algorithmic logic will be rewarded with respect to their severity and complexity and can be rewarded with up to 2^7 BC. Reported errors will be corrected within 48h so that the content of this site improves continuously.