Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 391,812 coordinated disclosures
222,542 fixed vulnerabilities
538 bug bounties with 1055 websites
10,790 researchers, 919 honor badges

  Please, login via Twitter first




Start Bug Bounty Program in 5 Easy Steps. It's Free!

Start Your Bug Bounty Program at Open Bug Bounty

Open Bug Bounty allows any verified website owners to run a bug bounty for their websites at no cost. The purpose of this non-profit activity is to make relations between website owners and security researchers sustainable and mutually beneficial in a long-term prospective.

Starting a bug bounty is free and open to everyone. Once logged in via Twitter, you can create your bug bounty program in a few minutes and get unlimited access to our security researchers. Once a vulnerability is reported, you will get instant notification to coordinate disclosure and remediation with researcher.

Open Bug Bounty does triage and verification of the submissions. However, we never intervene to the further process of your communication with the researchers, vulnerability remediation and disclosure. Once a vulnerability is verified and reported to you, our role in coordinated disclosure process is over.

For website owners, we provide vulnerability data export option to the following SDLC, DevOps and bug tracking systems:

  Bugzilla

  Splunk

  JIRA

  Mantis

General

Please carefully fill-in the form below to launch your bug bounty:

This will be a name under which your bug bounty will be displayed. Please use meaningful and relevant name to better guide the researchers.

Please read about type of vulnerability submissions and select the best one for you:

   Researchers will be able to submit both private and public submissions.
   Researchers will be able to submit private submissions only.

We will send notifications for domains from your scope to these email addresses. We do not share these email addresses with anybody.

Bug Bounty Scope

You will need to confirm your ownership of the website by placing a special security.txt file on it:

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

Please specify your Vulnerability Disclosure Program requirements. They will be displayed to security researchers:

Please specify technical or any other reasonable requirements for submissions (e.g. exclusion of self-XSS). Please specify any special requirements for testing methodologies (e.g. restriction to use vulnerability scanners). Please specify which rewards you may provide to the researchers who follow the above-mentioned requirements (e.g. recommendation in researcher's profile, mention in a Hall of Fame or something more valuable proportional to the researcher's efforts). Anything else you would like to bring to the attention of researchers community.

Other Submissions Handling

Open Bug Bounty does not accept security vulnerabilities that may require some sort of intrusive testing to be detected (e.g. SQL injection). Therefore, we do not accept, verify or store them on our platform. Nevertheless, as a website owner, you can specify how and where to report them if ever you wish them to be reported.



Please specify where and how (e.g. email) these vulnerabilities may be sent. You can provide your public PGP key here to encrypt the notifications sent via a method you specify above. Please specify technical or any other reasonable requirements for submissions (e.g. exclusion of self-XSS). Please specify any special requirements for testing methodologies (e.g. restriction to use vulnerability scanners). Please specify which rewards you may provide to the researchers who follow the above-mentioned requirements (e.g. recommendation in researcher's profile, mention in a Hall of Fame or something more valuable proportional to the researcher's efforts). Anything else you would like to bring to the attention of researchers community.

Need Any Help?

Need any help or have any questions about the bug bounty? The community forum is here to help!

  Latest Patched

 20.07.2019 cookinglight.com
 20.07.2019 foodandwine.com
 20.07.2019 people.com
 20.07.2019 health.com
 20.07.2019 instyle.com
 20.07.2019 peopleenespanol.com
 20.07.2019 southernliving.com
 20.07.2019 realsimple.com
 20.07.2019 vpnmentor.com
 19.07.2019 filmaffinity.com

  Latest Blog Posts

12.06.2019 by Open Bug Bounty
Open Bug Bounty pursues a steady growth in 2019 with over 212,148 fixed vulnerabilities
27.05.2019 by fakessh
bing openredirect
20.05.2019 by fakessh
Hitachi Incident Response Team (HIRT)
11.05.2019 by MAS00712
Footprinting and Reconnaissance with DIRB Tool (For Security Researcher and Bug Bounty Hunters)
01.05.2019 by Renzi25031469
1000's of default passwords on http://open-sez.me

  Recent Recommendations

    20 July, 2019
     IbassoI:
Thanks for the vulnerability report! The report was responsible and detailed enough to let us quickly verify and diagnose the issue, understand its impact, and fix it quickly. Ayan was reacting in lightning speed once I contacted him. He explained the issue to me very clear and provided a comprehensive amount of possible solutions. This was really great service, thanks so much!
    19 July, 2019
     nitrc_info:
Thanks for the vulnerability report! The report was responsible (private and without exploiting the vulnerability) and detailed enough to let us quickly verify and diagnose the issue, understand its impact, and fix it quickly.
    19 July, 2019
     nitrc_info:
Thank you for the report with proof of concept!
    19 July, 2019
     Geddo2k:
Thanks abdelhak for the xss- and CSRF-hint on our website! appreciate it.
    19 July, 2019
     AndyTrier:
He found the next bug on our Website! THANK YOU
Professional help, great work!