Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,660 coordinated disclosures
1,383,227 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,012 researchers, 1,651 honor badges

SMART VALOR Bug Bounty Program

SMART VALOR runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of SMART VALOR

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between SMART VALOR and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

smartvalor.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

The SMART VALOR team is making every effort to ensure security on our platform. To help us make the SMART VALOR Platform safer for our users, we heartily welcome security researchers, individuals or groups, to scrutinize the whole platform and report them to us. We will supervise a bug bounty program to advance constantly in this regards and to allow responsible identification and disclosure of reports with our security team.

We welcome all security and vulnerability reports on the SMART VALOR domain. The reporters shall be remunerated depending on the severity of the disclosed vulnerabilities. We wholeheartedly welcome disclosure of all issues. However, please note that qualification for compensation lies with bonafide security issues only. That this implies that the researcher should follow a responsible disclosure model and allow SMART VALOR equitable time to evaluate, fix and improve the vulnerability before details about it are made public should be apparent. We urge anyone researching vulnerabilities to transfer the information you find without an obligation to exploit the issues. Your fidelity to the practice of responsible disclosure is very much appreciated.

Testing Requirements:

* Tests should be considered as black-box tests. The design/infrastructure/implementation of the website shall not be known to the tester.
* Do not include proof of concepts that are compromising with the accounts of others. These are subject to disqualification. Make attack attempts only on accounts you own or are under your control.
* Testing using social engineering techniques is not recommended.
* DDoS attacks are strictly forbidden. DoS attacks that are triggered by exploiting business logic is welcomed. DoS by server resources exhaustion will be outlawed.
* No automated tests must be initiated without proper notice to SMART VALOR.
* Security of hardware, offices and/or employees of SMART VALOR is outside the scope of the program.

Qualifying Vulnerabilities:
* Cross Site Scripting (XSS)
* Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
* Authentication and Authorization Flaws
* Cross Site Request Forgery (CSRF)
* Remote Code Execution (RCE)
* Code injections (HTML, SQL, PHP, etc.)
* Insecure direct object references
* CORS
* Directory Traversal
* Privilege Escalation
* Stack traces or path disclosure
* DoS (ONLY ones that are triggered by abusing our business logic, not by server resources exhaustion)

Non-Qualifying Vulnerabilities:
* Self XSS
* Missing cookie flags
* SSL/TLS best practices
* Mixed content warnings
* DDoS attacks (strictly forbidden)
* HTTP Host Header XSS
* Clickjacking/UI redressing
* Software version disclosure
* Physical or social engineering attempts
* Recently disclosed 0-day vulnerabilities
* Presence of autocomplete attribute on web forms
* Vulnerabilities affecting outdated browsers or platforms
* Issues that require physical access to a victim’s computer/device
* Logout and other instances of low-severity Cross-Site Request Forgery
* Missing security-related HTTP headers which do not lead directly to a vulnerability
* Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated
* Invalid or missing SPF (Sender Policy Framework) records (Incomplete or missing SPF/DKIM/DMARC)

Eligibility requirements for monetary compensation:
* Report should abide by the testing requirements and submission guidelines.
* You must be the first researcher to report the vulnerability of a kind.
* The vulnerability must address a bonafide security problem.
* Allow SMART VALOR equitable time to evaluate, fix and improve upon the vulnerability before details about it are made public.
* You should not access personal information, leak/manipulate/tamper user data or cause disruption of service.
* You must send us a proof of concept detailing the steps to reproduce the vulnerability. Include screenshots and codes, if and when necessary.
* You cannot be a current or former employee of SMART VALOR or our contractors/data processors.

Guidelines for submission and information handling:
* Provide your name and contact information along with your submission.
* Allow SMART VALOR equitable time to evaluate, fix and improve upon the vulnerability before details about it are made public.
* The researcher should not access personal information, leak/manipulate/tamper user data or cause disruption of service.
* If need be, encrypt your findings using our PGP key and send them to [email protected].
* Do not disclose any issues to the public, or to any third party unless SMART VALOR grants explicit permission.
* Do not disclose any report submitted towards or in regard to this program unless SMART VALOR grants explicit permission.
* It is recommended that any questions regarding the schedule of the program with respect to a report be asked on the report that is submitted.

Note: The classification has been defined as an example and should be used for your reference

Possible Awards:

In addition to mentions on our Hall of Fame and a recommendation on your profile, SMART VALOR rewards the reports based on the severity of the vulnerabilities. The following is a compensation structure for reference.

Critical - up to 10,000 VALOR
Major - up to 1,000 VALOR
Minor - up to 100 VALOR
Trivial - up to 10 VALOR

Kindly note that SMART VALOR has the right to determine the severity level and modify the compensation model, as well as the right to decline or reject reports that do not meet the stated guidelines.

Note that all bounty VALORs are subject to a lock-up of 6 months.
For the latest price of the VALOR, visit: https://coinmarketcap.com/currencies/valor-token/

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

[email protected]

PGP Key:

Show key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2
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=A8ZX
-----END PGP PUBLIC KEY BLOCK-----

General Requirements:

If you are a researcher participating in the SMART VALOR Bug Bounty program, please send your findings to [email protected]. The fingerprint for the key is: F59B CF44 7182 0E45 B6A6 4C00 EE80 5449 C89B C811.

Testing Requirements:

* Tests should be considered as black-box tests. The design/infrastructure/implementation of the website shall not be known to the tester.
* Do not include proof of concepts that are compromising with the accounts of others. These are subject to disqualification. Make attack attempts only on accounts you own or are under your control.
* Testing using social engineering techniques is not recommended.
* DDoS attacks are strictly forbidden. DoS attacks that are triggered by exploiting business logic is welcomed. DoS by server resources exhaustion will be outlawed.
* No automated tests must be initiated without proper notice to SMART VALOR.
* Security of hardware, offices and/or employees of SMART VALOR is outside the scope of the program.

Qualifying Vulnerabilities:
* Cross Site Scripting (XSS)
* Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
* Authentication and Authorization Flaws
* Cross Site Request Forgery (CSRF)
* Remote Code Execution (RCE)
* Code injections (HTML, SQL, PHP, etc.)
* Insecure direct object references
* CORS
* Directory Traversal
* Privilege Escalation
* Stack traces or path disclosure
* DoS (ONLY ones that are triggered by abusing our business logic, not by server resources exhaustion)

Non-Qualifying Vulnerabilities:
* Self XSS
* Missing cookie flags
* SSL/TLS best practices
* Mixed content warnings
* DDoS attacks (strictly forbidden)
* HTTP Host Header XSS
* Clickjacking/UI redressing
* Software version disclosure
* Physical or social engineering attempts
* Recently disclosed 0-day vulnerabilities
* Presence of autocomplete attribute on web forms
* Vulnerabilities affecting outdated browsers or platforms
* Issues that require physical access to a victim’s computer/device
* Logout and other instances of low-severity Cross-Site Request Forgery
* Missing security-related HTTP headers which do not lead directly to a vulnerability
* Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated
* Invalid or missing SPF (Sender Policy Framework) records (Incomplete or missing SPF/DKIM/DMARC)

Eligibility requirements for monetary compensation:
* Report should abide by the testing requirements and submission guidelines.
* You must be the first researcher to report the vulnerability of a kind.
* The vulnerability must address a bonafide security problem.
* Allow SMART VALOR equitable time to evaluate, fix and improve upon the vulnerability before details about it are made public.
* You should not access personal information, leak/manipulate/tamper user data or cause disruption of service.
* You must send us a proof of concept detailing the steps to reproduce the vulnerability. Include screenshots and codes, if and when necessary.
* You cannot be a current or former employee of SMART VALOR or our contractors/data processors.

Guidelines for submission and information handling:
* Provide your name and contact information along with your submission.
* Allow SMART VALOR equitable time to evaluate, fix and improve upon the vulnerability before details about it are made public.
* The researcher should not access personal information, leak/manipulate/tamper user data or cause disruption of service.
* If need be, encrypt your findings using our PGP key and send them to [email protected].
* Do not disclose any issues to the public, or to any third party unless SMART VALOR grants explicit permission.
* Do not disclose any report submitted towards or in regard to this program unless SMART VALOR grants explicit permission.
* It is recommended that any questions regarding the schedule of the program with respect to a report be asked on the report that is submitted.

Note: The above classification has been defined as an example and should be used for your reference.

Possible Awards:

In addition to mentions on our Hall of Fame and a recommendation on your profile, SMART VALOR rewards the reports based on the severity of the vulnerabilities. The following is a compensation structure for reference.

Critical - up to 10,000 VALOR
Major - up to 1,000 VALOR
Minor - up to 100 VALOR
Trivial - up to 10 VALOR

Kindly note that SMART VALOR has the right to determine the severity level and modify the compensation model, as well as the right to decline or reject reports that do not meet the stated guidelines.

Note that all bounty VALORs are subject to a lock-up of 6 months.
For the latest price of the VALOR, visit: https://coinmarketcap.com/currencies/valor-token/

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv
 23.04.2024 data.aad.gov.au
 23.04.2024 bitporno.to
 23.04.2024 sys01.lib.hkbu.edu.hk
 23.04.2024 srvm.gov.za
 22.04.2024 stc.edu.hk
 22.04.2024 friv5online.com
 20.04.2024 brandonfowler.me

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!