Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
494,800 coordinated disclosures
269,945 fixed vulnerabilities
668 bug bounties with 1,349 websites
13,768 researchers, 1038 honor badges

  Please, login via Twitter first




Start Bug Bounty Program in 5 Easy Steps. It's Free!

Start Your Bug Bounty Program at Open Bug Bounty

Open Bug Bounty allows any verified website owners to run a bug bounty for their websites at no cost. The purpose of this non-profit activity is to make relations between website owners and security researchers sustainable and mutually beneficial in a long-term prospective.

Starting a bug bounty is free and open to everyone. Once logged in via Twitter, you can create your bug bounty program in a few minutes and get unlimited access to our security researchers. Once a vulnerability is reported, you will get instant notification to coordinate disclosure and remediation with researcher.

Open Bug Bounty does triage and verification of the submissions. However, we never intervene to the further process of your communication with the researchers, vulnerability remediation and disclosure. Once a vulnerability is verified and reported to you, our role in coordinated disclosure process is over.

For website owners, we provide vulnerability data export option to the following SDLC, DevOps and bug tracking systems:

  Bugzilla

  Splunk

  JIRA

  Mantis

General

Please carefully fill-in the form below to launch your bug bounty:

This will be a name under which your bug bounty will be displayed. Please use meaningful and relevant name to better guide the researchers.

Please read about type of vulnerability submissions and select the best one for you:

   Researchers will be able to submit both private and public submissions.
   Researchers will be able to submit private submissions only.

We will send notifications for domains from your scope to these email addresses. We do not share these email addresses with anybody.

Bug Bounty Scope

You will need to confirm your ownership of the website by placing a special security.txt file on it:

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

Please specify your Vulnerability Disclosure Program requirements. They will be displayed to security researchers:

Please specify technical or any other reasonable requirements for submissions (e.g. exclusion of self-XSS). Please specify any special requirements for testing methodologies (e.g. restriction to use vulnerability scanners). Please specify which rewards you may provide to the researchers who follow the above-mentioned requirements (e.g. recommendation in researcher's profile, mention in a Hall of Fame or something more valuable proportional to the researcher's efforts). Anything else you would like to bring to the attention of researchers community.

Other Submissions Handling

Open Bug Bounty does not accept security vulnerabilities that may require some sort of intrusive testing to be detected (e.g. SQL injection). Therefore, we do not accept, verify or store them on our platform. Nevertheless, as a website owner, you can specify how and where to report them if ever you wish them to be reported.



Please specify where and how (e.g. email) these vulnerabilities may be sent. You can provide your public PGP key here to encrypt the notifications sent via a method you specify above. Please specify technical or any other reasonable requirements for submissions (e.g. exclusion of self-XSS). Please specify any special requirements for testing methodologies (e.g. restriction to use vulnerability scanners). Please specify which rewards you may provide to the researchers who follow the above-mentioned requirements (e.g. recommendation in researcher's profile, mention in a Hall of Fame or something more valuable proportional to the researcher's efforts). Anything else you would like to bring to the attention of researchers community.

Need Any Help?

Need any help or have any questions about the bug bounty? The community forum is here to help!

  Latest Patched

 27.01.2020 ytranking.net
 27.01.2020 zapmeta.com
 27.01.2020 insidesport.co
 27.01.2020 laist.com
 27.01.2020 laposte.fr
 27.01.2020 name.com
 27.01.2020 nsmall.com
 27.01.2020 harvard.edu
 27.01.2020 apkgk.com
 27.01.2020 fueleconomy.gov

  Latest Blog Posts

20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com
08.01.2020 by devl00p
Top 100 Open Redirect dorks
08.01.2020 by Rando02355205
XSS WAF Bypassed

  Recent Recommendations

    27 January, 2020
     gaborvitez:
Helped us find and fix a cross site scripting vulnerability. He was very helpful and fast.
    27 January, 2020
     gaborvitez:
Found a cross site scripting vulnerability on our site, was very helpful with fast communication.
    27 January, 2020
     TristanGuiheux:
haxmov has helped us to find and fix some issues on web sites we're protecting. This kind of help is greatly appreciated from a security perspective. This way we can improve ourselves and protect our customers. Thanks again in my name.
    24 January, 2020
     2BeBetta:
Hi! Thanks for reporting an issue. It has been patched.
    24 January, 2020
     ryne70030772:
Thanks Again.