Bug bounty
Triaged by Hackenproof

1inch DevPortal: Program info

1inch DevPortal

Company: 1inch
POC required
Live
Program is active now
Program infoHackers (2)Reports

Powered by the 1inch Labs, the 1inch Developer Portal is a Web3 cloud SaaS (software as a service) platform offering multiple software services.

In scope
TargetTypeSeverityReward
api.1inch.dev
copy
Copy
success Copied
API
Critical
Bounty
portal.1inch.dev
copy
Copy
success Copied
Web
Critical
Bounty
portal.1inch.dev/documentation
copy
Copy
success Copied
Web
Medium
Bounty
1inch.dev
copy
Copy
success Copied
Web
Medium
Bounty
Target
api.1inch.dev
copy
Copy
success Copied
TypeAPI
Severity
Critical
RewardBounty
Target
portal.1inch.dev
copy
Copy
success Copied
TypeWeb
Severity
Critical
RewardBounty
Target
portal.1inch.dev/documentation
copy
Copy
success Copied
TypeWeb
Severity
Medium
RewardBounty
Target
1inch.dev
copy
Copy
success Copied
TypeWeb
Severity
Medium
RewardBounty

Focus Area

In-scope vulnerabilities

The following vulnerabilities are considered in-scope:

  • Business logic issues
  • Payments manipulation
  • Remote code execution (RCE)
  • Injection vulnerabilities
  • File inclusions
  • Access control issues (e.g., IDOR)
  • Server-side request forgery (SSRF)
  • Cross-site request forgery (CSRF)
  • Cross-site scripting (XSS)
  • Rate limiting bypass (if subscription level limit is exceeded and it’s reproducible)
  • Supply chain attack
  • Cryptographic vulnerabilities
  • Sensitive information disclosure
  • Password management issues (e.g., OAuth)
  • Session management issues (e.g., session stealing)
  • Cloud misconfigurations
  • Container security
  • Cache poisoning
  • Side-channel attacks
  • Any other vulnerability with a clear potential for loss (such vulnerabilities will be considered at our discretion)

All in-scope vulnerability reports must include a Proof of Concept (PoC) that demonstrates real-world impact. Submissions without a PoC will not be considered.

Out-of-scope vulnerabilities

Vulnerabilities identified in out-of-scope resources are generally not eligible for rewards unless they present a significant business risk, as determined at our sole discretion.

The following items are generally excluded from reward eligibility due to insufficient severity or lack of relevance to the program’s defined scope:

  • Recently (less than 30 days) disclosed zero-day vulnerabilities
  • Vulnerabilities affecting users of outdated browsers or platforms
  • Social engineering, phishing, physical, or other fraud activities
  • Publicly accessible login panels without proof of exploitation
  • Reports that simply identify outdated or vulnerable software without providing a valid proof of concept do not qualify.
  • Reports generated by automated scanners or exploit tools (without researcher analysis or actionable proof)
  • Vulnerabilities involving active content, such as web browser add-ons
  • Most brute-forcing issues without a clear impact
  • Denial of service (DoS/DDoS)
  • Missing HTTP security headers
  • Infrastructure vulnerabilities, including DNS issues (i.e., MX records, SPF records, DMARC records, etc.)
  • Open redirects (unless a serious impact is demonstrated)
  • Session fixation
  • User account enumeration
  • Descriptive error messages (e.g., stack traces, application or server errors)
  • Self-XSS that cannot be used to exploit other users
  • Login and logout CSRF
  • Weak captcha
  • HTTPOnly cookie flags
  • CSRF in forms that are available to anonymous users (e.g., contact forms)
  • OPTIONS/TRACE HTTP method enabled
  • Host header issues without proof-of-concept demonstrating a real impact
  • Content spoofing and text injection issues without showing an actual attack vector or the ability to modify HTML/CSS
  • Content spoofing without embedded links/HTML
  • Reflected file download (RFD)
  • Mixed HTTP/HTTPS content
  • Manipulation with password reset token (without real impact)
  • Man-in-the-middle (MitM) and local attacks
  • Public API domains
  • Theoretical or purely speculative exploits without demonstrated business impact

Program Rules

  • Avoid using application scanners that generate massive traffic. Automated scanning results without clear analysis will not be considered
  • Avoid causing any disruption to the availability of products, services, or infrastructure
  • Avoid compromising any personal data, interruption, or degradation of any service
  • Bounty reward is determined by proportion of potential damage and is limited by a severity rewards range
  • Non-production vulnerabilities are limited to High severity
  • Do not access or modify data belonging to other users
  • Perform testing only within the scope described in this program
  • Do not exploit any DoS/DDoS vulnerabilities, social engineering attacks, or spam methods
  • Do not spam forms or account creation flows using automated tools
  • Remain compliant with all applicable laws and operate strictly within the defined testing scope
  • Do not share details of any vulnerabilities with anyone outside the authorized team without explicit written permission from the organization

Disclosure Guidelines

  • All information related to this program, including any discovered vulnerabilities (resolved or unresolved), must be kept strictly confidential. Public disclosure — including partial disclosure or discussion in any public forum, channel, or platform — is strictly prohibited without the organization's explicit written consent

Eligibility and Coordinated Disclosure

We value all valid reports that help us strengthen our security. To qualify for a monetary reward, the following eligibility conditions must be fulfilled:

  • The vulnerability must be a qualifying (in-scope) vulnerability
  • Any vulnerability found must be reported no later than 24 hours after discovery
  • Include clear and concise reproduction steps to help us verify and assess the impact of the reported issue efficiently
  • You must be the first reporter of a vulnerability
  • You must send a clear textual description of the report and detailed steps to reproduce the issue. Include attachments such as screenshots or proof-of-concept code if necessary
  • You must not be a former or current employee of our company or any of its contractors
Rewards
Range of bounty$100 - $100,000
Severity
Critical
$30,000 - $100,000
High
$10,000 - $30,000
Medium
$2,000 - $10,000
Low
$100 - $2,000
Stats
Scope Review294
Submissions4
Total rewards$0
Types
Web
Project types
Other
Hackers (2) View all
zyad abdelfttah
1
Sarwo Edi Wibowo
2
SLA (Service Level Agreement)
Time within which the program's triage team must respond
Response TypeBusiness days
First Response3d
Triage Time3d
Reward Time90d
Resolution Time14d