We appreciate all security concerns brought forth and are constantly striving to keep on top of the latest threats. Being pro-active rather than re-active to emerging security issues is a fundamental belief at Intercom. Every day new security issues and attack vectors are created. Intercom strives to keep abreast on the latest state-of-the-art security developments by working with security researchers and companies. We appreciate the community's efforts in creating a more secure world.
Last updated 21 Aug 2018 00:15:41 UTC
Technical severity | Reward range
p1 Critical | $5,000 - $5,000
p2 Severe | $1,500 - $1,500
p3 Moderate | $300 - $300
p4 Low | $100 - $100
P5 submissions do not receive any rewards for this program.
Target name | Type
iOS SDK | iOS
Android SDK | Android
<https://api.intercom.io> | Other
<https://app.intercom.io/> | Other
*.intercomassets.com / *.intercomcdn.com | Other
All other domains/end-points other than those listed in the targets section, are out of scope.
Use the following payment details to sign up:
5338 5808 1418 6337 Expires: 03/21 CVV: 878 Country Ireland(Note: This is a disposable credit card created just for this Bug Bounty program and has the minimum credit assigned to it).
BUGCROWD2018will give 100% off.
Share this task with a teammateto get an invitation link that can be used to join the account/app.
NOTE: Accounts and related data will be deleted 30 days after creation.
Intercom will rely on the Bugcrowd Vulnerability Rating Taxonomy for prioritization of findings- but reserve the right to either downgrade or upgrade findings’ severity based on the criticality of their underlying risk to Intercom. Appropriate payouts will then be awarded accordingly. Any downgraded submission with come with a full and detailed explanation.
This program follows Bugcrowd’s standard disclosure terms.
This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.
Contact us if you want more information.