Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,702,925 coordinated disclosures
1,382,333 fixed vulnerabilities
1,990 bug bounty programs, 3,918 websites
46,810 researchers, 1,651 honor badges

danielmakelleyTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month | Security Researcher Profile


Security researcher danielmakelley has already helped fix 3048 vulnerabilities.



Researcher reputation:  340

Real name:
Daniel Kelley

About me:
Hall of Fames
Crown Court Digital System
Ministry of Justice
National Crime Agency
Parliament
University of Cambridge
Deutsche Bank
Norwegian School of Theology
Raffine
Australian National University
Netherlands Hockey Association
AtVirtual
Skoolbag LMS
Stanford University
ESET
Ecwid CMS
Room Booking System
CapMetro
DASH Payments
Boards IE
Luzerne College
Latostadora
Duke University
MIT University
AT&T
Esri
BBC
Sony
Deutsche Telekom
United Nations
Adobe
AOL
Houz

Contact email:
[email protected]

Alternative Contacts:
Web-page: https://danielmakelley.com/
LinkedIn: https://www.linkedin.com/in/danielmakelley/

Experience in Application Security
over 5 years

Recommendations and Acknowledgements | Full List:

@MChinnasamy     2 May, 2019
    Twitter MChinnasamy Manoj from Infrafrontier GmbH:
Dan helped us by finding the bug and promptly informed the same.
@suisho     25 March, 2018
    Twitter suisho AKI from densuke:
With precise advice, They helped me very much.
I really appreciate it.
@demetri     16 February, 2018
    Twitter demetri Demetri from BBNS:
I appreciate the approach of identifying vulnerabilities in a professional manner like this. Dan has been fast and helpful in communicating the issue clearly and concisely.
@filippo74     18 January, 2018
    Twitter filippo74 Filippo from mymovies.it:
Thank you for your report about XSS vulnerabilities... quick and very professional. Grazie
@_june     9 January, 2018
    Twitter _june Mia from ModCloth:
Thanks for your help! Fast and professional.
@Anthesum     5 January, 2018
    Twitter Anthesum Ralph from Spielplatznet.de:
Thanks for reporting the Cross Site Scripting issue. Helped me a lot to safeguard my website.
@dossy     22 December, 2017
    Twitter dossy Dossy S. from Panoptic:
Dan brought a previously-patched XSS issue that had somehow been regressed to my attention. Re-applied the fix and deployed: thanks!
@itea97137491     6 November, 2017
    Twitter itea97137491 Vincent from n/a:
Fast and professional! Thank you Dan
@robtexdotcom     31 October, 2017
    Twitter robtexdotcom Robert Olsson from Robtex:
Thank you for your kind help! Keep doing what you're doing.
Quick and professional and to the point.
@manuelgobeaut     21 October, 2017
    Twitter manuelgobeaut manuelgobeaut from W&B CREATION:
Thank you for discovering a security issue, and help me to solve it.
@theoldhorse3     19 October, 2017
    Twitter theoldhorse3 Alex from Arthur Conan Doyle:
Many thanks to you for pointing the bug. Much appreciated.
@barryhunter     19 October, 2017
    Twitter barryhunter Barry Hunter from Geograph Project:
Quick and simple. Found something we (obviously) not aware of, and prompted us to fix. Thanks.
@carlosdavidepto     8 September, 2017
    Twitter carlosdavidepto Carlos Davide from MULTILEARNING Group:
Quick and very professional reply to initial contact, with all pertinent details about the vulnerability (POC exploit, possible cause and suggestions for resolution).
@xech69     6 September, 2017
    Twitter xech69 xav from Omnispace:
Thank you for this intervention as fast as effective. And Dan gives us some leads to fix the problem. Great!
@SkillshareEng     31 August, 2017
    Twitter SkillshareEng Jennifer from Skillshare:
Fast and professional! Thanks Dan!!
@__sw1tch__     29 August, 2017
    Twitter __sw1tch__ Silas from Virgin Australia:
Dan is incredibly professional, very responsive and a pleasure to work with. Many thanks!
@MalagaCarCom     25 August, 2017
    Twitter MalagaCarCom Ruben from MalagaCar.com:
Dan found a cross-site scripting vulnerability in our site and sent us a notification. He even gave us some helpful indications on how to fix it, so the problem was solved in a few minutes. Thank you very much!
@davidnotset     18 August, 2017
    Twitter davidnotset David from Antadis:
Really fast to provide a proper vulnerability test case. Nice communication, really helpful. Great job Dan.
@antonioli     15 August, 2017
    Twitter antonioli Leonardo Antonioli from Niteroi's City Hall:
Thank you very much for pointing out the problem in our system and helping us to solve it. Dan was very helpful, responded quickly and with technical mastery of the situation. We are very thankful for the good work! Thank you very much on behalf of the Niterói's City Hall.
@Szilard41667708     10 August, 2017
    Twitter Szilard41667708 Szilard from Projects Abroad:
Thank you for your fast and professional response helping us to solve our security issue.
Keep up the good work !
@WWU_Muenster     2 August, 2017
    Twitter WWU_Muenster Johannes S. from WWU Muenster:
Many thanks for bringing this vulnerability to our attention and for providing clear and precise details of the problem, that helped us to solve the issue.
@srmihasr     25 July, 2017
    Twitter srmihasr Miha Lampret from FlatShare Ltd:
Thank you very much for fast and professional response. The details you have provided helped us to fix the flaw quickly.
@rdgourlay     31 January, 2017
    Twitter rdgourlay Rob Gourlay :
Many thanks for bringing this vulnerability to my attention and for providing clear and precise details of the problem. I really appreciate your assistance in retesting to make sure that I had resolved the issue.
@BrandeisInfoSec     8 December, 2016
    Twitter BrandeisInfoSec John from Brandeis University:
Dan was very helpful and informative, and super quick to reply. His info helped us ID a server that needed to be retired. Thanks!
@carldr     8 December, 2016
    Twitter carldr Carl Drinkwater from 29degrees Limited:
Quick communication along with a clear and concise report of how to reproduce the vulnerability. Thank you Dan for helping to resolve it as quickly as we did.
@geefgratis     7 December, 2016
    Twitter geefgratis Jordan van Bergen from Stichting GeefGratis:
Dan gave us a simple way to reproduce the vulnerability by e-mail and we where able to fix this issue because we could explain this easy and straight forward to our development party. It was like forwarding an e-mail to get it fixed.
@ISOatUO     31 October, 2016
    Twitter ISOatUO Jim Cheetham from University of Otago:
A good find in an obscure corner of our of our sites. Quickly communicated so we could fix the issue immediately. Many thanks.
@escubaguru     25 July, 2016
    Twitter escubaguru Daniel from eScuba Pty Ltd:
Totally responsive, very helpful - the best we've ever dealt with in the security space.
@ribenaisgood     30 June, 2016
    Twitter ribenaisgood Matt from A map company:
Dan gave us a simple way to reproduce the vulnerability and was quick to provide us with clear and detailed further information when we had questions about it.
@kominbhai     23 June, 2016
    Twitter kominbhai Komin Antony from InvestorWords:
Dan helped us find and provided the necessary details to fix the vulnerability on our website. It helped us to resolve the issue quickly and improved the overall security of our site.
@ActOnSoftware     8 June, 2016
    Twitter ActOnSoftware Jahvita Rastafari from Act-On Software:
Thanks to Dan, we have been able to identify and fix a vulnerability. We thank you for working with us to get this issue resolved!
@robferrer     6 June, 2016
    Twitter robferrer Rob Ferrer from Presto Classical Ltd:
Thank you very much for your responsible disclosure and professional response. I was able to patch the bug with little fuss.
@cpweather     4 May, 2016
    Twitter cpweather Christian from MC:
Thanks! Very quick and efficient! You help to make a safer web.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:5904
Total reports on VIP sites:784
Total patched vulnerabilities:3048
Recommendations received:33
Active since:25.04.2016
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions




No posts in blog yet










  Latest Patched

 18.04.2024 recycleright.sa.gov.au
 17.04.2024 maps.bolton.gov.uk
 16.04.2024 fishwatch.gov
 16.04.2024 renewableenergy.gov.bd
 13.04.2024 lit.am
 13.04.2024 overnewton.vic.edu.au
 13.04.2024 catalog.edu.pl
 13.04.2024 brandee.edu.vn

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    20 March, 2024
    TechVitaverdura:
Great exchanges with this person, thank you for your help and your report