In-scope vulnerabilities
The following vulnerabilities are considered in-scope:
- Business logic issues
- Remote code execution (RCE)
- Injection vulnerabilities
- Server-side request forgery (SSRF)
- Cross-site request forgery (CSRF)
- Cross-site scripting (XSS)
- Supply chain attack
- Cryptographic vulnerabilities
- Any other vulnerability with a clear potential for loss (such vulnerabilities will be considered at our discretion)
All in-scope vulnerability reports must include a Proof of Concept (PoC) that demonstrates real-world impact. Submissions without a PoC will not be considered.
Out-of-scope vulnerabilities
Vulnerabilities identified in out-of-scope resources are generally not eligible for rewards unless they present a significant business risk, as determined at our sole discretion.
The following items are generally excluded from reward eligibility due to insufficient severity or lack of relevance to the program’s defined scope:
- Recently (less than 30 days) disclosed zero-day vulnerabilities
- Vulnerabilities affecting users of outdated browsers or platforms
- Social engineering, phishing, physical, or other fraud activities
- Publicly accessible login panels without proof of exploitation
- Reports that simply identify outdated or vulnerable software without providing a valid proof of concept do not qualify.
- Reports generated by automated scanners or exploit tools (without researcher analysis or actionable proof)
- Vulnerabilities involving active content, such as web browser add-ons
Most brute-forcing issues without a clear impact
- Denial of service (DoS/DDoS)
- Missing HTTP security headers
- Infrastructure vulnerabilities, including DNS issues (i.e., MX records, SPF records, DMARC records, etc.)
- Open redirects (unless a serious impact is demonstrated)
- Clickjacking/Tapjackingissues
- Descriptive error messages (e.g., stack traces, application or server errors)
- Self-XSS that cannot be used to exploit other users
- Login and logout CSRF
- Weak Captcha
- HTTPOnly cookie flags
- CSRF in forms that are available to anonymous users (e.g., contact forms)
- OPTIONS/TRACE HTTP method enabled
- Host header issues without proof-of-concept demonstrating a real impact
- Content spoofing and text injection issues without showing an actual attack vector or the ability to modify HTML/CSS
- Content spoofing without embedded links/HTML
- Reflected file download (RFD)
- Mixed HTTP/HTTPS content
- Man-in-the-middle (MitM) and local attacks
- Theoretical or purely speculative exploits without demonstrated business impact