Dashboard



Recent Scopes (30 days or less)

Target: Quora
  • Asset type: WILDCARD
  • Asset identifier: *.quora.com
  • Max severity: critical
  • Updated at: July 27, 2024, 2:53 a.m.
  • Instructions:

    Except for subdomains managed by third parties, such as help.quora.com, careers.quora.com, and business.quora.com.

Target: Quora
  • Asset type: URL
  • Asset identifier: poe.com
  • Max severity: critical
  • Updated at: July 27, 2024, 1:37 a.m.
  • Instructions:

Target: Consensys
  • Asset type: URL
  • Asset identifier: https://www.infura.io/faucet/linea
  • Max severity: critical
  • Updated at: July 26, 2024, 9:22 a.m.
Target: Consensys
  • Asset type: URL
  • Asset identifier: https://www.infura.io/faucet/sepolia
  • Max severity: critical
  • Updated at: July 26, 2024, 9:21 a.m.
Target: pixiv
  • Asset type: URL
  • Asset identifier: pastela.app
  • Max severity: critical
  • Updated at: July 26, 2024, 3:01 a.m.
  • Instructions:

    - This site uses pixiv account (signup at https://accounts.pixiv.net).
    - PC: https://pastela.app
    - iPadOS: https://apps.apple.com/app/pastela/id6478907270

Target: Krisp
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: https://download.krisp.ai/win
  • Max severity: critical
  • Updated at: July 25, 2024, 9:03 a.m.
  • Instructions:

    Krisp Windows electron app.
    Bypassing free minutes limitation via changing frontend applications' logic is out of scope

Target: Krisp
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: https://download.krisp.ai/mac
  • Max severity: critical
  • Updated at: July 25, 2024, 9:03 a.m.
  • Instructions:

    Krisp MacOS electron app.
    Bypassing free minutes limitation via changing frontend applications' logic is out of scope

Target: Krisp
  • Asset type: WILDCARD
  • Asset identifier: *.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:03 p.m.
  • Instructions:

    Except for OOS domains

Target: Krisp
  • Asset type: URL
  • Asset identifier: api.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:03 p.m.
  • Instructions:

    Krisp API

Target: Krisp
  • Asset type: URL
  • Asset identifier: teams.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:02 p.m.
  • Instructions:

    Teams API

Target: Krisp
  • Asset type: URL
  • Asset identifier: download.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:02 p.m.
  • Instructions:

    Download endpoints

Target: Krisp
  • Asset type: URL
  • Asset identifier: analytics.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:01 p.m.
  • Instructions:

    Krisp analytics

Target: Krisp
  • Asset type: URL
  • Asset identifier: upld.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:01 p.m.
  • Instructions:

    Websocket API

Target: Krisp
  • Asset type: URL
  • Asset identifier: app.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4:01 p.m.
  • Instructions:

    Krisp account frontend

Target: Krisp
  • Asset type: URL
  • Asset identifier: account.krisp.ai
  • Max severity: critical
  • Updated at: July 24, 2024, 4 p.m.
  • Instructions:

    Krisp account frontend

Target: hostinger
  • Asset type: OTHER
  • Asset identifier: H5G
  • Max severity: critical
  • Updated at: July 24, 2024, 11:30 a.m.
  • Instructions:

    We are introducing a new testing scope for our Hosting Infrastructure tailored for WordPress websites.

  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/0xPolygon/static
  • Max severity: high
  • Updated at: July 23, 2024, 8:57 a.m.
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/0xPolygon/lxly.js
  • Max severity: high
  • Updated at: July 23, 2024, 8:56 a.m.
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/0xPolygon/auto-claim-service
  • Max severity: high
  • Updated at: July 23, 2024, 8:54 a.m.
  • Asset type: API
  • Asset identifier: balance-api.polygon.technology/
  • Max severity: high
  • Updated at: July 23, 2024, 8:50 a.m.
  • Asset type: API
  • Asset identifier: api-polygon-tokens.polygon.technology/
  • Max severity: high
  • Updated at: July 23, 2024, 8:49 a.m.
  • Asset type: API
  • Asset identifier: gasstation.polygon.technology/
  • Max severity: high
  • Updated at: July 23, 2024, 8:47 a.m.
  • Asset type: API
  • Asset identifier: api-gateway.polygon.technology
  • Max severity: critical
  • Updated at: July 23, 2024, 8:45 a.m.
  • Asset type: API
  • Asset identifier: faucet-api.polygon.technology/
  • Max severity: high
  • Updated at: July 23, 2024, 8:43 a.m.
  • Asset type: URL
  • Asset identifier: staking.polygon.technology
  • Max severity: critical
  • Updated at: July 23, 2024, 8:41 a.m.
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/0xPolygon/proof-generation-api
  • Max severity: high
  • Updated at: July 23, 2024, 8:37 a.m.
  • Asset type: URL
  • Asset identifier: ecosystem-api.polygon.technology
  • Max severity: medium
  • Updated at: July 23, 2024, 8:36 a.m.
  • Asset type: URL
  • Asset identifier: ecosystem.polygon.technology
  • Max severity: medium
  • Updated at: July 23, 2024, 8:32 a.m.
Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: 8x8.my.site.com
  • Max severity: high
  • Updated at: July 22, 2024, 2:08 p.m.
  • Instructions:

    Portal for management of your 8x8 account, billing, orders, and support cases
    ⚠️ when testing support functionality please add "HackerOne" in your subject line and limit the number of requests to an absolute minimum
    ⚠️ out of scope: IDORs in form of unguessable/non-enumerable identifier (UUID)

Target: ALSCO
  • Asset type: URL
  • Asset identifier: checksw.com
  • Max severity: critical
  • Updated at: July 21, 2024, 12:10 a.m.
  • Instructions:

    1- Check if you can pass the two authentications provided by Secure Gateway mobile APP, Try any possible way to login without receiving the code, or try brute force the code or pass the rate limit.

    2- Check if you can pass upload prevention system, try any file extension out of the list (jpg,jpeg,png,gif,jfif,mp4,doc,docx,pdf,xls,xlsx,ppsx,ppt,pptx,flv,rar,zip,htm,html) And the file you uploaded should function in a browser when visiting the file.

    3- Check whether you can pass the Secure Gateway upload detector system, for example upload '.jpg' file It has the word [php_uname] in the file content (not in file name).

    Instructions
    For 2FA, you need to install 'Secure Gateway' APP on your phone to get onetime a code. Secure Gateway APP can be downloaded by clicking on the link below.

    For Apple Devices
    https://apps.apple.com/us/app/secure-gateway/id1633721151
    For Android Devices
    https://play.google.com/store/apps/details?id=com.alscotoday.SecureGateway

    Then contact us to provide you with a test account to login to Secure Gateway APP.

    Guidelines:
    1-Only full hack scenario will be accepted, e.g., edit the index page, or download the database.

    2-Upload html file contain JavaScript are not considered as vulnerability, Unless you can change an index page, database or file on our system.

    3-A recorded video must be included with every report submitted.

    4- If you don't follow these guidelines we will not award a bounty for the report.

    5-Business logic errors and misconfigurations are out of scope, but you are welcome to submit reports.

    Required Reporting Format
    Affected target, feature, or URL:
    Description of problem:
    Impact of the issue:
    Steps to reproduce:
    Proof of Concept:
    Is knowledge of this issue currently public?
    Only complete hacking scenarios will be accepted; otherwise, the report will be closed.
    Any report that does not follow these guidelines will be rejected and closed.

Target: Dynamic Labs
  • Asset type: URL
  • Asset identifier: demo.dynamic.xyz
  • Max severity: low
  • Updated at: July 19, 2024, 2:18 p.m.
  • Instructions:

    While demo.dynamic.xyz is set to low severity, do note that we consider reports where using demo.dynamic.xyz to expose an issue with the backend api (https://app.dynamic.xyz and https://app.dynamicauth.com) to be critical.

    For example, any issues that are specific to demo only are considered low.

Target: Adobe
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.adobe.reader
  • Max severity: critical
  • Updated at: July 18, 2024, 3:18 p.m.
Target: Adobe
  • Asset type: GOOGLE_PLAY_APP_ID
  • Asset identifier: com.adobe.scan.android
  • Max severity: critical
  • Updated at: July 18, 2024, 3:17 p.m.
Target: Adobe
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: com.adobe.scan.ios
  • Max severity: critical
  • Updated at: July 18, 2024, 3:15 p.m.
Target: Adobe
  • Asset type: APPLE_STORE_APP_ID
  • Asset identifier: com.adobe.Adobe-Reader
  • Max severity: critical
  • Updated at: July 18, 2024, 3:13 p.m.
Target: Adobe
  • Asset type: URL
  • Asset identifier: acrobat.adobe.com
  • Max severity: critical
  • Updated at: July 18, 2024, 3:11 p.m.
Target: Adobe
  • Asset type: URL
  • Asset identifier: photoshop.adobe.com
  • Max severity: critical
  • Updated at: July 18, 2024, 3:10 p.m.
  • Instructions:

    Please refer to Photoshop Web Test Plan on how to access/test the environment.

Target: Adobe
  • Asset type: URL
  • Asset identifier: learningmanager.adobe.com
  • Max severity: critical
  • Updated at: July 18, 2024, 3:08 p.m.
  • Instructions:

    Please refer to Adobe Learning Manager Test Plan on how to access/test the environment.

Target: Adobe
  • Asset type: DOWNLOADABLE_EXECUTABLES
  • Asset identifier: ColdFusion
  • Max severity: critical
  • Updated at: July 18, 2024, 3:06 p.m.
  • Instructions:

    Please refer to ColdFusion Test Plan on how to access/test the environment.

Target: Adobe
  • Asset type: URL
  • Asset identifier: firefly.adobe.com
  • Max severity: critical
  • Updated at: July 18, 2024, 3:03 p.m.
Target: Epic Games
  • Asset type: WILDCARD
  • Asset identifier: *.epicgames.dev
  • Max severity: critical
  • Updated at: July 18, 2024, 12:54 p.m.
  • Asset type: URL
  • Asset identifier: *.gs.de
  • Max severity: critical
  • Updated at: July 17, 2024, 4:16 p.m.
  • Instructions:

    Includes:
    *.gs.de
    *.gsmarkets.de
    *.gsmarkets.nl
    *.gsmarkets.at
    *.gsmarkets.be

    Excludes the 3rd party hosted site:
    classic.gs.de

    In scope sites may display a page overlay to US visitors which can be hidden using an adblocker like uBlock Origin

Target: 8x8 Bounty
  • Asset type: OTHER
  • Asset identifier: 8x8 Partner Portal
  • Max severity: high
  • Updated at: July 17, 2024, 9:11 a.m.
  • Instructions:

    ▶︎ https://partnerxchange.8x8.com/
    ▶︎ https://8x8.my.site.com/partnerxchange/
    ▶︎ https://8x8.force.com/partnerxchange/
    ⚠️ out of scope: Disclosure of non-sensitive information, such as `Name`, `City`, etc.
    ⚠️ out of scope: `ContentDocument` if considered non-sensitive (e.g. marketing collateral)
    ⚠️ out of scope: IDORs in form of unguessable/non-enumerable identifier (UUID)

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: sso.8x8pilot.com
  • Max severity: critical
  • Updated at: July 17, 2024, 12:19 a.m.
  • Instructions:

    8x8 Single Sign-On (SSO) is a session and user authentication service that permits a user to use one set of login credentials, such as name and password, to access multiple 8x8 applications.
    ⚠️ MFA-bypasses requiring prior knowledge of credentials will be treated with `MEDIUM` severity.

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: sso.8x8.com
  • Max severity: critical
  • Updated at: July 17, 2024, 12:18 a.m.
  • Instructions:

    8x8 Single Sign-On (SSO) is a session and user authentication service that permits a user to use one set of login credentials, such as name and password, to access multiple 8x8 applications.
    ⚠️ MFA-bypasses requiring prior knowledge of credentials will be treated with `MEDIUM` severity.

Target: Remitly
  • Asset type: URL
  • Asset identifier: news.remitly.com
  • Max severity: high
  • Updated at: July 16, 2024, 4:42 p.m.
Target: Remitly
  • Asset type: URL
  • Asset identifier: metrics.int.remitly.com
  • Max severity: medium
  • Updated at: July 16, 2024, 3:13 p.m.
Target: Mozilla
  • Asset type: OTHER
  • Asset identifier: Mozilla Ad Routing Service
  • Max severity: critical
  • Updated at: July 15, 2024, 8:36 a.m.
  • Instructions:

    ** Critical Site **
    Mozilla Ad Routing Service (MARS) under the below domains:
    - mars.prod.ads.prod.webservices.mozgcp.net
    - mars.stage.ads.nonprod.webservices.mozgcp.net
    - mars.qa.ads.nonprod.webservices.mozgcp.net
    - ads-img.mozilla.org
    - ads-img.allizom.org
    - contile.services.mozilla.com
    - spocs.getpocket.com
    - spocs.getpocket.dev
    - spocs.mozilla.net
    - spocs.allizom.net

    Testing to be done on the staging instance:
    - mars.stage.ads.nonprod.webservices.mozgcp.net

Target: FloQast
  • Asset type: WILDCARD
  • Asset identifier: https://*.floqast.engineering
  • Max severity: critical
  • Updated at: July 13, 2024, 1:22 p.m.
  • Instructions:

    These domains shouldn't be accessible, so if you're able to get a 200 response and get the actual page contents and not something like "You need to enable JavaScript to run this app. ", please don't hesitate to submit a report.

Target: Chime
  • Asset type: OTHER
  • Asset identifier: Chime Android App (Beta)
  • Max severity: critical
  • Updated at: July 11, 2024, 8:19 p.m.
  • Instructions:

    https://app.bitrise.io/app/5bec038cb1e318cd/build/66388a74-e438-4122-9d61-b32c26bbe8c9/artifact/2056514eda872997/p/789676b08317aea2499d7696845b40cf

Target: Chime
  • Asset type: OTHER
  • Asset identifier: Chime IOS App (Beta)
  • Max severity: critical
  • Updated at: July 11, 2024, 8:19 p.m.
  • Instructions:

    https://app.bitrise.io/app/5bec038cb1e318cd/build/2d02c60d-2969-44c6-b107-455271135ac3/artifact/039822d285b5f226/p/e73d97370b6c1a453423fedba7b312f6

Target: Remitly
  • Asset type: URL
  • Asset identifier: ir.remitly.com
  • Max severity: high
  • Updated at: July 11, 2024, 6:55 p.m.
Target: Remitly
  • Asset type: URL
  • Asset identifier: careers.remitly.com
  • Max severity: high
  • Updated at: July 11, 2024, 6:55 p.m.
Target: Nimiq
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/nimiq/core-rs-albatross
  • Max severity: critical
  • Updated at: July 11, 2024, 5:36 p.m.
  • Instructions:

    Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.

    Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.

    When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).

    Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.

    Social engineering (e.g. phishing, vishing, smishing) is prohibited.

    Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.

    ## Exploring our repository:
    - Blockchain: Manages the blockchain structure, block validation, and chain state.
    - Consensus: Implements the consensus mechanism and synchronization.
    - Validator: Contains logic for the validator role, including signing and verification processes.
    - Primitives: Includes fundamental types and utilities used across other crates, such as data structures for accounts, blocks, transactions, and various cryptographic functions.

    ## Quick start:
    - Prerequisites:
    - Install the latest version of Rust by following the instructions on the [Rust website](https://www.rust-lang.org/learn/get-started#installing-rust).
    - Installation:
    - Clone the Repository: `git clone https://github.com/nimiq/core-rs-albatross.git`
    - Move to the Repository: `cd core-rs-albatross`
    - Build the project and start a basic full node: `cargo run --release --bin nimiq-
    client`

    For more details, check the repository [Reame file](https://github.com/nimiq/core-rs-albatross/blob/albatross/README.md).

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: qm-*.8x8.com
  • Max severity: critical
  • Updated at: July 11, 2024, 1:46 a.m.
  • Instructions:

    Quality Management & Speech Analytics

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: vcc-ce-*.8x8.com
  • Max severity: critical
  • Updated at: July 11, 2024, 1:46 a.m.
  • Instructions:

    Customer Experience and Post-Call Survey Analytics
    front-end, e.g.: https://vcc-ce.8x8.com/analytix/rt-dashboard.htm

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: analytics-*.8x8.com
  • Max severity: critical
  • Updated at: July 11, 2024, 1:46 a.m.
  • Instructions:

    Analytics for Contact Center
    ⚠️ shareable Wallboard links are out of scope

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: dashboard.qa.ai.8x8.com
  • Max severity: critical
  • Updated at: July 11, 2024, 1:46 a.m.
  • Instructions:

    Analytics for 8x8 Work

Target: Bumble
  • Asset type: URL
  • Asset identifier: www.bumble.com
  • Max severity: critical
  • Updated at: July 10, 2024, 10:11 a.m.
  • Instructions:

    Tier 1

Target: Reddit
  • Asset type: URL
  • Asset identifier: business.reddithelp.com
  • Max severity: critical
  • Updated at: July 8, 2024, 3:37 p.m.
  • Instructions:

    [Non-core asset]
    Reddit maintains a SFDC tenant for customer management for our advertisers. SFDC bugs aren't eligible for payout, but misconfigurations that are Reddit's responsibility are.

  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/maticnetwork/matic-cli
  • Max severity: critical
  • Updated at: July 5, 2024, 8:03 p.m.
Target: Crypto.com
  • Asset type: SOURCE_CODE
  • Asset identifier: https://github.com/crypto-com/chain-desktop-wallet
  • Max severity: low
  • Updated at: July 4, 2024, 8:50 p.m.
Target: MercadoLibre
  • Asset type: URL
  • Asset identifier: www.mercadopago.com.br
  • Max severity: critical
  • Updated at: July 4, 2024, 4:30 p.m.
Target: Consensys
  • Asset type: WILDCARD
  • Asset identifier: *.api.cx.metamask.io
  • Max severity: critical
  • Updated at: July 3, 2024, 3:35 p.m.
  • Asset type: URL
  • Asset identifier: bookus.expediacruises.com
  • Max severity: critical
  • Updated at: July 2, 2024, 6:23 a.m.
Target: MetaMask
  • Asset type: URL
  • Asset identifier: https://user-storage.api.cx.metamask.io
  • Max severity: critical
  • Updated at: July 1, 2024, 10:01 a.m.
  • Instructions:

    The User Storage API helps developers synchronize data across multiple clients and devices in a privacy-preserving way. All data saved in the user storage database is encrypted client-side to preserve privacy.
    Documentation can be found in this [Doc](https://docs.google.com/document/u/1/d/e/2PACX-1vRzlbxKTKQ4x8mvUEUs8hv-fcGsi0W717Pbg2_Rk3lcoM5PuSCI66JUWaWdL_Vz0GNMbZU4aYaC2rcQ/pub)

Target: MetaMask
  • Asset type: OTHER
  • Asset identifier: Authentication component
  • Max severity: critical
  • Updated at: July 1, 2024, 9:40 a.m.
  • Instructions:

    The Authentication component is used to provide MetaMask users services that require to be logged in and/or identified.
    It is comprised of an Authentication API at: https://authentication.api.cx.metamask.io/ and an ORY Hydra OAuth server at: https://oidc.api.cx.metamask.io.

    Documentation can be found in this [Doc]( https://docs.google.com/document/u/1/d/e/2PACX-1vRzlbxKTKQ4x8mvUEUs8hv-fcGsi0W717Pbg2_Rk3lcoM5PuSCI66JUWaWdL_Vz0GNMbZU4aYaC2rcQ/pub)

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: sms.8x8.com
  • Max severity: critical
  • Updated at: July 1, 2024, 1:19 a.m.
  • Instructions:

    ▶︎ API usage via sign-up on [8x8 Connect](https://connect.8x8.com/login/signup)
    ▶︎ Usage is described in [8x8 CPaaS developer portal](https://developer.8x8.com/connect)
    ▶︎ All related APIs under `8x8 Connect` (e.g. SMS API, Verification API, Chatapps API, Voice API, …) are in-scope

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: connect.8x8.com
  • Max severity: critical
  • Updated at: July 1, 2024, 1:19 a.m.
  • Instructions:

    ⚠️ out of scope: IDORs in form of unguessable/non-enumerable identifier (UUID)
    ⚠️ out of scope: IDORs based on `AccountId` and `subAccountId`
    ⚠️ when testing support functionality please add "HackerOne" in your subject line and limit the number of requests to an absolute minimum

Target: 8x8 Bounty
  • Asset type: WILDCARD
  • Asset identifier: vcc-*.8x8.com
  • Max severity: critical
  • Updated at: July 1, 2024, 1:15 a.m.
  • Instructions:

    ► Contact Center Agent Workspace:
    `./AGUI/login.php`
    ► Configuration Manager:
    `./CM/login.php`

    ⚠️ Latest version of software usually available on https://vcc-na30.8x8.com/
    ⚠️ shareable Wallboard links are out of scope

Target: 8x8 Bounty
  • Asset type: URL
  • Asset identifier: admin.8x8.com
  • Max severity: critical
  • Updated at: July 1, 2024, 1:11 a.m.
  • Instructions:

    Administration portal for managing your 8x8 service including users and telephony features

Target: Roblox
  • Asset type: OTHER
  • Asset identifier: Campaign
  • Max severity: critical
  • Updated at: June 28, 2024, 10:57 p.m.
  • Asset type: URL
  • Asset identifier: www.marriott.com
  • Max severity: critical
  • Updated at: June 27, 2024, 2:59 p.m.