Rewards Range
Critical (CVSS 9.0–10.0): $800 – $3,000
CVSS 9.0-9.3: $800-$1,500
CVSS 9.4-9.7: $1,500-$2,200
CVSS 9.8-10.0: $2,200-$3,000
High (CVSS 7.0–8.9): $600 – $800
CVSS 7.0–7.5: $600 – $650
CVSS 7.6–8.2: $650 – $725
CVSS 8.3–8.9: $725 – $800
Medium (CVSS 4.0–6.9): $300 – $600
CVSS 4.0–4.9: $300 – $400
CVSS 5.0–5.9: $400 – $500
CVSS 6.0–6.9: $500 – $600
Low (CVSS 0.1–3.9): $50 – $300
CVSS 0.1–1.9: $50 – $150
CVSS 2.0–2.9: $150 – $225
CVSS 3.0–3.9: $225 – $300
IN SCOPE VULNERABILITIES: WEB, MOBILE
We are interested in the following vulnerabilities:
- Business logic issues
- Payments manipulation
- Remote code execution (RCE)
- Injection vulnerabilities (SQL, XXE)
- File inclusions (Local & Remote)
- Access Control Issues (IDOR, Privilege Escalation, etc)
- Leakage of sensitive information
- Server-Side Request Forgery (SSRF)
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Directory traversal
- Other vulnerabilities with a clear potential loss
OUT OF SCOPE: WEB VULNERABILITIES
Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold:
- Vulnerabilities in third-party applications
- Assets that do not belong to the company
- Best practices concerns
- Recently (less than 30 days) disclosed 0day vulnerabilities
- Vulnerabilities affecting users of outdated browsers or platforms
- Social engineering, phishing, physical, or other fraud activities
- Publicly accessible login panels without proof of exploitation
- Reports that state that software is out of date / vulnerable without a proof of concept
- Reports generated by scanners or any automated or active exploit tools
- Vulnerabilities involving active content such as web browser add-ons
- Most brute-forcing issues without clear impact
- Denial of service (DoS/DDoS)
- Theoretical issues
- Moderately Sensitive Information Disclosure
- Spam (sms, email, etc)
- Missing HTTP security headers
- Infrastructure vulnerabilities, including:
- Certificates/TLS/SSL-related issues;
- DNS issues (i.e. MX records, SPF records, DMARC records etc.);
- Server configuration issues (i.e., open ports, TLS, etc.)
- Open redirects
- Session fixation
- User account enumeration
- Clickjacking / Tapjacking and issues only exploitable through clickjacking/tapjacking
- Descriptive error messages (e.g. Stack Traces, application or server errors)
- Self-XSS that cannot be used to exploit other users
- Login & Logout CSRF
- Weak Captcha / Captcha Bypass
- Lack of Secure and HTTPOnly cookie flags
- Username / email enumeration via Login/Forgot Password Page error messages
- CSRF in forms that are available to anonymous users (e.g. the contact form)
- OPTIONS / TRACE HTTP method enabled
- Host header issues without proof-of-concept demonstrating clear security impact
- Content spoofing and text injection issues without showing an attack vector / without being able to modify HTML/CSS
- Content Spoofing without embedded links / HTML
- Reflected File Download (RFD)
- Mixed HTTP Content
- HTTPS Mixed Content Scripts
- Manipulation with Password Reset Token
- MitM and local attacks
- Response manipulations without demonstration of system state change
OUT OF SCOPE: MOBILE VULNERABILITIES
- Attacks requiring physical access to a user's device
- Vulnerabilities that require root/jailbreak
- Vulnerabilities requiring extensive user interaction
- Exposure of non-sensitive data on the device
- Reports from static analysis of the binary without PoC that impacts business logic
- Lack of obfuscation/binary protection/root (jailbreak) detection
- Bypass certificate pinning on rooted devices
- Lack of Exploit mitigations i.e., PIE, ARC, or Stack Canaries
- Sensitive data in URLs/request bodies when protected by TLS
- Path disclosure in binary
- OAuth & app secret hard-coded/recoverable in IPA, APK
- Sensitive information retained as plaintext in the device’s memory
- Crashes due to malformed URL Schemes or Intents sent to exported Activity/Service/Broadcast Receiver
- Any kind of sensitive data stored in-app private directory
- Runtime hacking exploits using tools like but not limited to Frida/Appmon (exploits only possible in a jailbroken environment)
- Shared links leaked through the system clipboard
- Any URIs leaked because a malicious app has permission to view URIs opened.
- Exposure of API keys with no security impact (Google Maps API keys etc.)
- Reports that bypass rate limiting through changing of IP addresses/Device IDs
- Address bar/URL/domain spoofing in dApp browser
- Reports with mobile versions not downloaded from official sites listed in our scope