Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,702,924 coordinated disclosures
1,382,530 fixed vulnerabilities
1,989 bug bounty programs, 3,917 websites
46,828 researchers, 1,651 honor badges

Telivy Bug Bounty Program

Telivy runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Telivy

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Telivy and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

- This program is open to all ethical security researchers 18 years of age or older.
- You must agree to our program terms of service, which prohibit illegal activity, social engineering, and denial-of-service attacks.

Reporting Process:

Please submit all bug reports through this platform
Alternatively, you can email us at: [email protected]
Your report should be clear, concise, and include the following information:
- A brief summary of the vulnerability
- Detailed steps to reproduce the vulnerability
- Proof of concept (e.g., screenshots, code snippets) if possible
- An explanation of the potential impact of the vulnerability
- Your assessment of the vulnerability severity based on our guidelines (link guidelines)

Testing Requirements:

- restriction to use vulnerability scanners
- Focus on only
- Please do not test during off hours (Weekends and after 5 pm)
- please do not perform social engineering attacks
- We are particularly interested in vulnerabilities that could lead to:
Unauthorized access to user data or systems
System compromise or takeover
Breaches of confidentiality, integrity, or availability
- We appreciate responsible disclosure practices. Please do not exploit vulnerabilities for personal gain or publicly disclose them before we have had a reasonable opportunity to fix them (typically 60 days).

Possible Awards:

- Recommendations for any future opportunities
- Telivy swag if available
- We reserve the right to exclude certain vulnerabilities from reward consideration, such as low-risk findings or those easily discoverable through automated tools.
- Opportunity to consult for Telivy

We aim to acknowledge all submitted reports within [number] business days. We will keep you informed of the bug fixing process and estimated timelines for resolution. Once a vulnerability is verified and fixed, bounty payouts, if any will be processed within 30 business days.

Special Notes:

- The discovered vulnerabilities should not be disclosed elsewhere to be available for any credit or awards.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched


  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    10 April, 2024
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    20 March, 2024
Great exchanges with this person, thank you for your help and your report