Transparency

Commitment to security and compliance

We understand the importance of transparency in crypto, which is why we maintain industry standard security measures to ensure our commitment to regulations.

If you have any questions or concerns regarding our Anti-Money Laundering (AML) policies or need to report suspicious activity, please contact us at hello@sortedwallet.com.

Partners

Amlbot

AMLbot is a sophisticated anti-money laundering (AML) tool designed for the cryptocurrency industry. It helps businesses and individuals comply with global AML regulations by providing real-time risk assessments of cryptocurrency transactions and wallets.

AMLbot leverages advanced algorithms and extensive databases to identify suspicious activities, ensuring that users can mitigate risks associated with illicit financial activities. By integrating AMLbot into Sorted Wallet, we analyze all wallet addresses against over 20 risk sources, identifying suspicious transactions and assessing risk levels.

Bug bounty

Help us make Sorted more secure!

Sorted Wallet is launching a bug bounty program with a $10,000 prize pool for discovering vulnerabilities in our code. We invite security researchers and ethical hackers to help enhance our platform's security. Significant rewards await those who identify and responsibly disclose critical bugs, reinforcing our commitment to user safety and the integrity of the Web3 ecosystem.

We will distribute $10,000 among all participants who report a unique high-severity bug until 1/1/2025.

Bug Examples
High severity

Unauthorized Access: Gain unauthorized access to a user's wallet without their consent.

Private Key Exposure: Any vulnerability that results in the exposure or leakage of users' private keys.

Transaction Manipulation: A flaw that enables unauthorized modification or interception of transactions.

Fund Theft: Any exploit that allows an attacker to transfer funds out of a user's wallet without authorization.

Authentication Bypass: A bug that allows attackers to bypass authentication mechanisms, such as passwords or PIN codes.

Data Corruption: Any issue that leads to the corruption or loss of critical wallet data, including transaction histories and balances.

Remote Code Execution: A vulnerability that allows an attacker to execute arbitrary code on the user's device.

Security Protocol Breach: Flaws in the encryption or security protocols that protect user data and transactions.

To participate in the bug bounty program, please submit a descriptive report to hello@sortedwallet.com with the subject "Bug Bounty" along with your information.