Dashboard


Recent Scopes (30 days or less)

Target: MongoDB
  • Asset type: OTHER
  • Asset identifier: All Evergreen Assets (Excluding staging)
  • Max severity: critical
  • Updated at: June 10, 2025, 9:11 a.m.
Target: OPPO
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.heytap.mall
  • Max severity: critical
  • Updated at: June 10, 2025, 9:02 a.m.
Target: OPPO
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.heytap.store
  • Max severity: critical
  • Updated at: June 10, 2025, 8:39 a.m.
Target: OPPO
  • Asset type: URL
  • Asset identifier: https://www.oppo.com/th/store
  • Max severity: critical
  • Updated at: June 10, 2025, 8:35 a.m.
Target: OPPO
  • Asset type: URL
  • Asset identifier: https://www.oppo.com/id/store
  • Max severity: critical
  • Updated at: June 10, 2025, 8:32 a.m.
Target: OPPO
  • Asset type: URL
  • Asset identifier: https://www.oppo.com/my/store
  • Max severity: critical
  • Updated at: June 10, 2025, 8:31 a.m.
Target: OPPO
  • Asset type: URL
  • Asset identifier: https://www.oppo.com/th
  • Max severity: critical
  • Updated at: June 10, 2025, 8:29 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.trip.biz
  • Max severity: critical
  • Updated at: June 10, 2025, 5:30 a.m.
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: UISP
  • Max severity: critical
  • Updated at: June 6, 2025, 4:01 p.m.
Target: Visa
  • Asset type: URL
  • Asset identifier: https://ebctest.cybersource.com/merchant-mgmt/
  • Max severity: critical
  • Updated at: June 6, 2025, 3:38 p.m.
Target: Mozilla
  • Asset type: URL
  • Asset identifier: accounts.firefox.com
  • Max severity: critical
  • Updated at: June 6, 2025, 1:16 p.m.
  • Instructions:

    ** Critical Site**

    Mozilla Accounts (previously known as Firefox Accounts)

    Additional domains in scope for Firefox Accounts:
    * api.accounts.firefox.com
    * oauth.accounts.firefox.com
    * profile.accounts.firefox.com
    * verifier.accounts.firefox.com
    * graphql.accounts.firefox.com
    * subscriptions.firefox.com

    Source Code: https://github.com/mozilla/fxa

Target: CS Money
  • Asset type: URL
  • Asset identifier: blog.cs.money
  • Max severity: critical
  • Updated at: June 6, 2025, 10:09 a.m.
  • Instructions:

    By visiting this domain you will be redirected to our blog at [cs.money/blog/](https://cs.money/blog/). This is a web application built on Wordpress.

    Out of Scope
    WordPress Core Vulnerabilities
    Any vulnerabilities resulting from bugs or shortcomings in the WordPress core itself (e.g., issues with form validation, incorrect API implementations, vulnerabilities in the base architecture of WordPress, etc.).
    This also includes cases where an outdated and potentially vulnerable version of WordPress is being used.

    Plugin Vulnerabilities
    Vulnerabilities in third-party or built-in WordPress plugins that extend the blog's functionality (e.g., SEO plugins, contact form plugins, etc.).
    Also included are configuration errors or flaws that are directly related to issues within the plugin itself.

    Theme Vulnerabilities
    Vulnerabilities associated with custom or default WordPress themes (e.g., broken or unsafe layout structure, vulnerable JavaScript or PHP files within the theme, templating issues, etc.).
    Any flaws in the operation of themes (standard or custom) that may lead to site compromise via known or outdated theme components are considered out of scope.

    Version Conflicts or WordPress Setup Issues
    All cases where the problem stems solely from an improperly installed or conflicting version of WordPress and can be resolved by updating or switching to another version.

    Manual Installation or Modification of WordPress
    Vulnerabilities that require manual code changes to the WordPress core, or installing/configuring third-party plugins or themes solely to reproduce the issue.

Target: Mozilla
  • Asset type: URL
  • Asset identifier: developer.mozilla.org
  • Max severity: critical
  • Updated at: June 4, 2025, 3:22 p.m.
  • Instructions:

    **Core Site**

    Please use the staging instance for intrusive tests or for tests which change the content: https://developer.allizom.org

    Source Code:
    Main application: https://github.com/mdn/mdn
    Repos under https://github.com/mdn

Target: Kolesa Group
  • Asset type: URL
  • Asset identifier: kolesa.kz
  • Max severity: critical
  • Updated at: June 4, 2025, 8:12 a.m.
  • Instructions:

Target: Kolesa Group
  • Asset type: URL
  • Asset identifier: m.kolesa.kz
  • Max severity: critical
  • Updated at: June 4, 2025, 8:12 a.m.
  • Instructions:

Target: Kolesa Group
  • Asset type: OTHER_APK
  • Asset identifier: kz.kolesa
  • Max severity: critical
  • Updated at: June 4, 2025, 8:12 a.m.
  • Instructions:

Target: Kolesa Group
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: 563291345
  • Max severity: critical
  • Updated at: June 4, 2025, 8:12 a.m.
  • Instructions:

  • Asset type: URL
  • Asset identifier: careers.marriott.com
  • Max severity: critical
  • Updated at: June 3, 2025, 2:34 p.m.
Target: 8x8 Bounty
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/jitsi
  • Max severity: critical
  • Updated at: June 3, 2025, 4:17 a.m.
  • Instructions:

    Open source repositories that support [Jitsi](https://github.com/jitsi/).
    Jitsi Meet offers free, secure and open-source video conferencing.
    ⚠️ Good faith review of source that a reporter must have no association with the existence of the vulnerability in question.

    **Proof of Concept Requirements:**
    ⚠️ Vulnerability submissions must include practical exploitation demonstrations on one of the following environments
    ▶︎ The public Jitsi Meet instance ([meet.jit.si](https://meet.jit.si/))
    ▶︎ 8x8 Video Meetings platform ([8x8.vc](https://8x8.vc/))
    ▶︎ A self-hosted Jitsi deployment

    **Out of Scope:**
    ▶︎ Not actively maintained or archived repositories
    ▶︎ [github.com/jitsi/jitsi](https://github.com/jitsi/jitsi/)
    [Jitsi Desktop](https://github.com/jitsi/jitsi/) is the heritage of [Jitsi Meet](https://github.com/jitsi/jitsi-meet). While some components are still used in e.g. Jigasi, the project is not actively developed anymore. Improvements, bugfixes and builds are entirely based on community contributions.

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: *.jit.si
  • Max severity: critical
  • Updated at: June 2, 2025, 10:29 p.m.
  • Instructions:

    Jitsi is a set of open-source projects that allows you to easily build and deploy secure videoconferencing solutions. We are best known for our Jitsi Meet video conferencing platform, [meet.jit.si](https://meet.jit.si/) where we host a Jitsi Meet instance that the community can use for totally free video conferences , and the Jitsi Videobridge that powers all of our multi-party video capabilities.

    **Out of Scope:**
    ⚠️ Application logic bugs or non-production features in [beta.meet.jit.si](https://beta.meet.jit.si/)

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: *.jitsi.net
  • Max severity: critical
  • Updated at: June 2, 2025, 10:29 p.m.
  • Instructions:

    Jitsi is a set of open-source projects that allows you to easily build and deploy secure videoconferencing solutions. We are best known for our Jitsi Meet video conferencing platform.

    **Out of Scope:**
    ⚠️ Application logic bugs or non-production features in [moderated-pilot.jitsi.net](https://moderated-pilot.jitsi.net/)

  • Asset type: HARDWARE
  • Asset identifier: UniFi Connect
  • Max severity: critical
  • Updated at: June 2, 2025, 8:25 p.m.
Target: Circle BBP
  • Asset type: SMART_CONTRACT
  • Asset identifier: https://github.com/circlefin/evm-gateway-contracts
  • Max severity: critical
  • Updated at: May 30, 2025, 6:50 p.m.
Target: Slack
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/slackhq/nebula
  • Max severity: critical
  • Updated at: May 30, 2025, 4:42 p.m.
  • Instructions:

    Only Critical reports will be accepted and paid

Target: Payoneer
  • Asset type: URL
  • Asset identifier: myaccount-cn.payoneer.com
  • Max severity: critical
  • Updated at: May 30, 2025, 1:35 p.m.
  • Instructions:

    Please use @wearehackerone.com for test accounts.

Target: Trip.com
  • Asset type: URL
  • Asset identifier: trip.biz
  • Max severity: critical
  • Updated at: May 29, 2025, 8:52 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.vliegwinkel.nl
  • Max severity: critical
  • Updated at: May 29, 2025, 8:32 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.vayama.com
  • Max severity: critical
  • Updated at: May 29, 2025, 8:31 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.flugladen.de
  • Max severity: critical
  • Updated at: May 29, 2025, 8:31 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.budgetair.com
  • Max severity: critical
  • Updated at: May 29, 2025, 8:30 a.m.
Target: Trip.com
  • Asset type: URL
  • Asset identifier: app.blueskytravelvietnam.com
  • Max severity: critical
  • Updated at: May 29, 2025, 8:28 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.tyo-masters.co.jp
  • Max severity: critical
  • Updated at: May 29, 2025, 8:18 a.m.
Target: Trip.com
  • Asset type: WILDCARD
  • Asset identifier: *.triplinkintl.com
  • Max severity: critical
  • Updated at: May 29, 2025, 7:41 a.m.
Target: SIX Group
  • Asset type: CIDR
  • Asset identifier: 153.46.34.0/23
  • Max severity: critical
  • Updated at: May 28, 2025, 9:51 a.m.
Target: SIX Group
  • Asset type: CIDR
  • Asset identifier: 153.46.32.0/23
  • Max severity: critical
  • Updated at: May 28, 2025, 9:51 a.m.
Target: SIX Group
  • Asset type: CIDR
  • Asset identifier: 153.46.30.0/23
  • Max severity: critical
  • Updated at: May 28, 2025, 9:51 a.m.
Target: Superbet
  • Asset type: URL
  • Asset identifier: https://superbet.rs
  • Max severity: critical
  • Updated at: May 26, 2025, 8:32 a.m.
  • Instructions:

    Website available only from Serbia.

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://napoleongames.be
  • Max severity: critical
  • Updated at: May 26, 2025, 8:32 a.m.
  • Instructions:

    Website available only from Belgium
    You need a real/fake Belgium ID to register an account on the main casino/sport app. You can generate a fake ID here - http://rsolution.be/rijksregister-nummer-generator.RSolution

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://napoleondice.be
  • Max severity: critical
  • Updated at: May 26, 2025, 8:31 a.m.
  • Instructions:

    Website available only from Belgium.
    You need a real/fake Belgium ID to register an account on the main casino/sport app. You can generate a fake ID here - http://rsolution.be/rijksregister-nummer-generator.RSolution

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://napoleonsports.be
  • Max severity: critical
  • Updated at: May 26, 2025, 8:30 a.m.
  • Instructions:

    Website available only from Belgium. You need a real/fake Belgium ID to register an account on the main casino/sport app. You can generate a fake ID here - http://rsolution.be/rijksregister-nummer-generator.RSolution

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://napoleoncasino.be
  • Max severity: critical
  • Updated at: May 26, 2025, 8:23 a.m.
  • Instructions:

    Website available only from Belgium
    You need a real/fake Belgium ID to register an account on the main casino/sport app. You can generate a fake ID here - http://rsolution.be/rijksregister-nummer-generator.RSolution

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://superbet.pl
  • Max severity: critical
  • Updated at: May 26, 2025, 8:22 a.m.
  • Instructions:

    Website available only from Poland

Target: Superbet
  • Asset type: URL
  • Asset identifier: https://superbet.ro
  • Max severity: critical
  • Updated at: May 26, 2025, 8:21 a.m.
  • Instructions:

    For our main application superbet.ro You can use a Romanian fake CNP generator in order to create an account, such as - https://isj.educv.ro/cnp/ in order to create an account. Make sure you are using a Romanian VPN as the portal works only for Romanian IP’s.

    Or use a test account from this list( some of them might not work so try multiple ones):
    hackeronesuperbet02 - jV%J5ypt9mJVe$
    hackeronesuperbet03 - CSK2ZhG3LetSD8O
    hackeronesuperbet04 - qKSi52$YkdXv58
    hackeronesuperbet05 - ZgZc9jbgZ82Bh&
    hackeronesuperbet06 - !u#^ogsrh9vt9N

    ● Please add the following User-Agent header when you are using any automated tools or scripts - User-agent: hackerone -. Requests that will not contain this cookie header might get blocked by our tools/SOC team.

Target: Superbet
  • Asset type: URL
  • Asset identifier: superbet.bet.br
  • Max severity: critical
  • Updated at: May 26, 2025, 8:17 a.m.
  • Instructions:

    Website available only for Brazil.
    hackeronesuperbet01 - 7Es3tkFrDaUfw#
    hackeronesuperbet02 - &$6i@Co$iMcn&S
    hackeronesuperbet03 - Uz5S#Eu32@w4yQ
    hackeronesuperbet04 - xb9^^aTAw83Ec&
    hackeronesuperbet05 - m54C9u^%J87oie
    hackeronesuperbet07 - jFat!DHhn4XcpL
    hackeronesuperbet08 - sc#N9w7Dx*76^X
    hackeronesuperbet09 - R6ifcvTZTv%v%Y

Target: Stripe
  • Asset type: WILDCARD
  • Asset identifier: *.lemonsqueezy.com
  • Max severity: critical
  • Updated at: May 23, 2025, 11 a.m.
  • Instructions:

Target: inDrive
  • Asset type: URL
  • Asset identifier: https://cas-cf.euce1.indriverapp.com/api/passkey
  • Max severity: critical
  • Updated at: May 23, 2025, 4:46 a.m.
  • Asset type: HARDWARE
  • Asset identifier: Arduino Nano
  • Max severity: critical
  • Updated at: May 22, 2025, 2:50 p.m.
  • Instructions:

    Here is the link to purchase an Arduino Hardware: https://store-usa.arduino.cc/products/nano-matter
    https://github.com/SiliconLabs/arduino

    Submissions are limited to issues discovered on matter nano boards listed above.

  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/SiliconLabsSoftware/aiml-extension
  • Max severity: critical
  • Updated at: May 22, 2025, 2:46 p.m.
  • Instructions:

    Alpha quality code and not part of the program

Target: Priceline
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.priceline.android.negotiator
  • Max severity: critical
  • Updated at: May 22, 2025, 1:22 p.m.
Target: Priceline
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: 336381998
  • Max severity: critical
  • Updated at: May 22, 2025, 1:21 p.m.
  • Instructions:

    [Priceline iOS App](https://apps.apple.com/us/app/priceline-hotel-travel-deals/id336381998)

Target: Priceline
  • Asset type: URL
  • Asset identifier: bookingholdings-coe.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:20 p.m.
Target: Priceline
  • Asset type: AI_MODEL
  • Asset identifier: Penny
  • Max severity: critical
  • Updated at: May 22, 2025, 1:20 p.m.
  • Instructions:

    https://www.priceline.com/penny

Target: Priceline
  • Asset type: URL
  • Asset identifier: secure.rezserver.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:19 p.m.
Target: Priceline
  • Asset type: URL
  • Asset identifier: reservations.rezserver.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:19 p.m.
Target: Priceline
  • Asset type: URL
  • Asset identifier: api.rezserver.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:19 p.m.
  • Instructions:

    **Rezserver API**
    _Policy Guidance_
    We are not currently providing credentials for this asset.

    _Rules_
    - Don't use automated tools or scanners
    - Don't DDoS

    _Out of scope vulnerabilities_
    - Missing best practices in HTTP header configuration.
    - Any activity that could lead to the disruption of our service (DoS)
    - Missing best practices in SSL/TLS configuration
    - Account/email enumeration issues
    - Disclosure of software version numbers (we maintain forks of several tools, and apply security patches accordingly)
    - Content Spoofing/Text Injection that cannot be leveraged for XSS or sensitive data disclosure

    _Endpoints out of scope_
    - Hotel: BookRequest
    - Air: All endpoints
    - Car: All endpoints
    - Custom: All endpoints

Target: Priceline
  • Asset type: URL
  • Asset identifier: cruises.priceline.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:18 p.m.
Target: Priceline
  • Asset type: URL
  • Asset identifier: www.priceline.com
  • Max severity: critical
  • Updated at: May 22, 2025, 1:16 p.m.
Target: Newegg
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.newegg.app
  • Max severity: critical
  • Updated at: May 21, 2025, 6:55 p.m.
Target: Newegg
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: com.newegg.app
  • Max severity: critical
  • Updated at: May 21, 2025, 6:54 p.m.
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: Dia
  • Max severity: critical
  • Updated at: May 20, 2025, 4:06 p.m.
Target: MongoDB
  • Asset type: OTHER
  • Asset identifier: *.cloud.mongodb.com/*
  • Max severity: critical
  • Updated at: May 19, 2025, 2:18 p.m.
Target: Magic Eden
  • Asset type: URL
  • Asset identifier: slingshot.finance
  • Max severity: high
  • Updated at: May 16, 2025, 12:08 a.m.
Target: Magic Eden
  • Asset type: OTHER
  • Asset identifier: Magic Eden Wallet (Chrome Extension)
  • Max severity: critical
  • Updated at: May 16, 2025, 12:07 a.m.
  • Instructions:

    Android, iOS, and Chrome Extension versions of the wallet share a common codebase. Submissions will be deduplicated across each asset.

Target: Magic Eden
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: com.magiceden.wallet
  • Max severity: critical
  • Updated at: May 16, 2025, 12:07 a.m.
  • Instructions:

    Android, iOS, and Chrome Extension versions of the wallet share a common codebase. Submissions will be deduplicated across each asset.

Target: Magic Eden
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.magiceden.wallet
  • Max severity: critical
  • Updated at: May 16, 2025, 12:07 a.m.
  • Instructions:

    Android, iOS, and Chrome Extension versions of the wallet share a common codebase. Submissions will be deduplicated across each asset.

Target: Magic Eden
  • Asset type: URL
  • Asset identifier: slingshot.app
  • Max severity: critical
  • Updated at: May 16, 2025, 12:05 a.m.
Target: Grab
  • Asset type: WILDCARD
  • Asset identifier: *.ovofinansial.com
  • Max severity: critical
  • Updated at: May 15, 2025, 5:35 a.m.
  • Instructions:

    *.taralite.com has been rebranded as OVO Finansial

Target: Malwarebytes
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: Malwarebytes Support Tool (MBST)
  • Max severity: critical
  • Updated at: May 14, 2025, 12:16 p.m.
  • Instructions:

    The Support Tool troubleshoots and repairs issues with Malwarebytes Desktop Security for Windows devices.
    Product page: https://help.malwarebytes.com/hc/en-us/articles/31589431159579-Repair-Desktop-Security-with-the-Support-Tool

Target: Grab
  • Asset type: URL
  • Asset identifier: hungrygowhere.com
  • Max severity: high
  • Updated at: May 13, 2025, 5:11 a.m.
  • Instructions:

    HungryGoWhere is a food discovery platform that helps users explore dining options, reviews, and deals, primarily in Singapore.

Target: Grab
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: 1481198245
  • Max severity: critical
  • Updated at: May 13, 2025, 5:11 a.m.
  • Instructions:

    MoveIt is an independent two-wheeler taxi platform serving the Philippines.

Target: Grab
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.moveit.app.customer
  • Max severity: critical
  • Updated at: May 13, 2025, 5:09 a.m.
  • Instructions:

    MoveIt is an independent two-wheeler taxi platform serving the Philippines.

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: connect.8x8.com
  • Max severity: critical
  • Updated at: May 13, 2025, 12:42 a.m.
  • Instructions:

    ⚠️ **Temporary Scope Exclusion**: campaign.wavecell.com, contacts.8x8.com
    ---
    ⚠️ out of scope: IDORs in form of unguessable/non-enumerable identifier (UUID)
    ⚠️ out of scope: IDORs based on `AccountId` and `subAccountId`
    ⚠️ when testing support functionality please add "HackerOne" in your subject line and limit the number of requests to an absolute minimum

Target: Ring
  • Asset type: URL
  • Asset identifier: publicsafety.ring.com
  • Max severity: critical
  • Updated at: May 12, 2025, 11:44 p.m.
Target: LaunchDarkly
  • Asset type: URL
  • Asset identifier: https://launchdarkly.com/docs
  • Max severity: critical
  • Updated at: May 12, 2025, 5:06 p.m.
  • Instructions:

    This is our static documentation website.

Target: KAYAK
  • Asset type: URL
  • Asset identifier: kayak.ai
  • Max severity: critical
  • Updated at: May 12, 2025, 2:39 p.m.