Zomato icon Zomato HackerOne


Target Policy
https://hackerone.com/zomato?type=team
Structured Scope
  • Asset Identifier
    Asset Type
    Max Severity
  • *.edition.in
    WILDCARD
    critical
  • All Assets (other than Blinkit)

    Bounty table header

    OTHER
    critical
  • 991745732
    APPLE_STORE_APP_ID
    critical
  • 912349367
    APPLE_STORE_APP_ID
    critical
  • http://*.zomato.com
    WILDCARD
    critical
  • http://*.zdev.net
    WILDCARD
    critical
  • http://*.zomans.com

    This domain is mainly used for internal applications that are hosted in AWS. Our area of interest is any issue that can potentially give anyone unrestricted access or expose internal or confidential data.

    WILDCARD
    critical
  • http://*.hyperpure.com
    WILDCARD
    critical
  • http://*.runnr.in
    WILDCARD
    critical
  • *.district.in
    WILDCARD
    critical
  • *.insider.in
    WILDCARD
    critical
  • BlinkIT, District & Hyperpure assets (in scope)
    OTHER
    critical
  • All Assets (other than)
    OTHER
    critical
  • *.hyperpure.com
    WILDCARD
    critical
  • http://*.grofers.com
    WILDCARD
    critical
  • blinkit.com
    URL
    critical
  • All District Assets (Other than Zomato, BlinkIT & Hyperpure)
    OTHER
    critical
  • *.tktnew.com
    WILDCARD
    critical
  • BlinkIT & Hyperpure assets (in scope)
    OTHER
    critical
  • com.grofers.customerapp
    GOOGLE_PLAY_APP_ID
    critical
  • *.ticketnew.com
    WILDCARD
    critical
  • *.runnr.in
    WILDCARD
    critical
  • *.zomato.com
    WILDCARD
    critical
  • BlinkIT, Hyperpure assets (in scope)
    OTHER
    critical
  • 434613896

    Zomato: Food Delivery & Dining

    APPLE_STORE_APP_ID
    critical
  • All Blinkit assets (in scope)
    OTHER
    critical
  • com.application.zomato
    GOOGLE_PLAY_APP_ID
    critical
  • All Zomato Assets (Other than BlinkIT & Hyperpure)
    OTHER
    critical
  • *.zomans.com

    This domain is mainly used for internal applications that are hosted in AWS. Our area of interest is any issue that can potentially give anyone unrestricted access or expose internal or confidential data.

    WILDCARD
    critical
  • api2.grofers.com
    URL
    critical
  • www.zomatobook.com
    URL
    none
  • business-blog.zomato.com
    URL
    none
  • com.application.zomatomerchant
    GOOGLE_PLAY_APP_ID
    critical
  • com.application.zomato.ordering
    GOOGLE_PLAY_APP_ID
    none
  • blog.zomato.com
    URL
    none
  • community.zomato.com
    URL
    none
  • success.zomato.com
    URL
    none
  • send.zomato.com
    URL
    none
  • dev.hyperpure.com
    URL
    none
  • devapi.hyperpure.com
    URL
    none
  • devpod.hyperpure.com
    URL
    none
  • staging*.runnr.in

    Please don't test on staging/dev instances. Instead, we have created a dedicated environment `bugbounty.runnr.in` which is a replica of the same for testing.

    WILDCARD
    none
  • *.zdev.net
    WILDCARD
    critical
  • api.grofers.com
    URL
    critical
  • com.grofers.customerapp

    Blinkit's Customer Android App:
    https://play.google.com/store/apps/details?id=com.grofers.customerapp

    GOOGLE_PLAY_APP_ID
    critical
  • Scope Questions: Items not explicitly listed here

    If you have a question about something that is not explicitly listed as out-of-scope or in-scope, please submit a report and we will provide clarification. We will allow you to self close that report after we answer your question.

    OTHER
    critical
  • winecellar.zomato.com
    URL
    critical
  • http://*.grofer.io
    WILDCARD
    critical
Target Scope Domains
  • api.grofers.com
  • api2.grofers.com
  • blinkit.com
  • district.in
  • edition.in
  • grofer.io
  • grofers.com
  • hyperpure.com
  • insider.in
  • runnr.in
  • ticketnew.com
  • tktnew.com
  • winecellar.zomato.com
  • zdev.net
  • zomans.com
  • zomato.com
Tech Stack
  • Akamai
  • Akamai Bot Manager
  • Amazon Cloudfront
  • Amazon Elb
  • Amazon S3
  • Amazon Web Services
  • Amp
  • Apache Http Server
  • Apache Http Server:2.4.6
  • Basic
  • Bootstrap
  • Bootstrap:97c9c1d99a35391395750c26b3285d2178bab3ae
  • Bootstrap:Dc4c73184b292b1abaf0a8d340545d0c15694a78
  • Cdnjs
  • Centos
  • Cloudflare
  • Cloudflare Bot Management
  • Contentful
  • Cufon
  • Envoy
  • Firebase
  • Google Analytics
  • Google Hosted Libraries
  • Google Sign-In
  • Google Tag Manager
  • Hsts
  • Http/3
  • Jquery
  • Jquery Ui
  • Lodash
  • Microsoft Asp.Net
  • Mysql
  • Next.Js
  • Nginx
  • Nginx:1.25.1
  • Node.Js
  • Openssl:1.0.2k
  • Php
  • React
  • Ruby
  • Ruby On Rails
  • Select2
  • Tumblr
  • Varnish
  • Webpack
  • Wordpress
  • Zabbix

Last Finished Scan:
Scan Name
Fleet
Finished
State
allhttpx
8 months ago
Finished
  • Fleet: allhttpx
  • Duration: 10.00 Hours
  • Finished: 8 months ago