In-scope vulnerabilities
The following vulnerabilities are considered in-scope:
- Business logic issues
- Payments manipulation
- Remote code execution (RCE)
- Injection vulnerabilities
- File inclusions
- Access control issues (e.g., IDOR)
- Server-side request forgery (SSRF)
- Cross-site request forgery (CSRF)
- Cross-site scripting (XSS)
- Rate limiting bypass (if subscription level limit is exceeded and it’s reproducible)
- Supply chain attack
- Cryptographic vulnerabilities
- Sensitive information disclosure
- Password management issues (e.g., OAuth)
- Session management issues (e.g., session stealing)
- Cloud misconfigurations
- Container security
- Cache poisoning
- Side-channel attacks
- Any other vulnerability with a clear potential for loss (such vulnerabilities will be considered at our discretion)
All in-scope vulnerability reports must include a Proof of Concept (PoC) that demonstrates real-world impact. Submissions without a PoC will not be considered.
Out-of-scope vulnerabilities
Vulnerabilities identified in out-of-scope resources are generally not eligible for rewards unless they present a significant business risk, as determined at our sole discretion.
The following items are generally excluded from reward eligibility due to insufficient severity or lack of relevance to the program’s defined scope:
- Recently (less than 30 days) disclosed zero-day vulnerabilities
- Vulnerabilities affecting users of outdated browsers or platforms
- Social engineering, phishing, physical, or other fraud activities
- Publicly accessible login panels without proof of exploitation
- Reports that simply identify outdated or vulnerable software without providing a valid proof of concept do not qualify.
- Reports generated by automated scanners or exploit tools (without researcher analysis or actionable proof)
- Vulnerabilities involving active content, such as web browser add-ons
- Most brute-forcing issues without a clear impact
- Denial of service (DoS/DDoS)
- Missing HTTP security headers
- Infrastructure vulnerabilities, including DNS issues (i.e., MX records, SPF records, DMARC records, etc.)
- Open redirects (unless a serious impact is demonstrated)
- Session fixation
- User account enumeration
- Descriptive error messages (e.g., stack traces, application or server errors)
- Self-XSS that cannot be used to exploit other users
- Login and logout CSRF
- Weak captcha
- HTTPOnly cookie flags
- CSRF in forms that are available to anonymous users (e.g., contact forms)
- OPTIONS/TRACE HTTP method enabled
- Host header issues without proof-of-concept demonstrating a real impact
- Content spoofing and text injection issues without showing an actual attack vector or the ability to modify HTML/CSS
- Content spoofing without embedded links/HTML
- Reflected file download (RFD)
- Mixed HTTP/HTTPS content
- Manipulation with password reset token (without real impact)
- Man-in-the-middle (MitM) and local attacks
- Public API domains
- Theoretical or purely speculative exploits without demonstrated business impact