The security and privacy of your data are our utmost concern. Lark abides by rigorous security policies, and implements robust systems to protect user data. We encourage security research individuals as well as teams to test our security, and we offer rewards for valid reported vulnerabilities. As we keep on adding new features, we encourage community researchers to keep working on our projects to find new vulnerabilities.
Lark Technologies will make a best effort to meet the following response targets for hackers participating in our program:
Time to first response (from report submit) - 1 business days
Time to triage (from report submit) - 3 business days
Time to bounty (from triage) - 5 business days
We’ll try to keep you informed about our progress throughout the process.
We support public recognition and disclosure of contributions and findings for those participants who desire. We will seek to allow participants to be publicly recognized whenever possible. Public disclosure of a vulnerability (either full or partial) is allowed after being coordinated with Lark Team and disclosed on HackerOne. If 180 days have elapsed with the Lark Team not providing a vulnerability disclosure timeline, the contents of the report may be publicly disclosed by the reporter. Retention, copying, or disclosure of Lark information gained as a result of participation is not permitted.
If requesting beyond limited HackerOne disclosure (e.g. in a blog or at a conference), please share your blog post or presentation with us prior to the publication.
You must be the first reporter to report the issue to us. We will only reward the first reporter.
When submitting a vulnerability, please provide us with enough information so that we could reproduce and verify it.
Please use your own account for testing purposes. Do not gain access to another user's account or their confidential information.
Please do not test for denial of service, spam, social engineering issues.
All of the tests must not violate any law, or compromise any data that is not your own.
Please contact security@larksuite.com to report security incidents such as customer data leakage or breach of infrastructure
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
Submit one vulnerability per-report, unless you need to chain vulnerabilities to provide impact.
When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
You may register up to two test accounts on https://www.larksuite.com/ for free
You will be required to create a domain name for each account which you will be using to do your testing
To better understand the Lark Suite Product and its core functions, please refer to the updated Treasure Map 2.1 we have created: https://bytedance.feishu.cn/docs/doccnlT329U2f6EFPV5Bvqa0f3A#ZWfYX1
Typical bug bounty rewards range from $100 to $5,000, depending on their severity and asset tier. No upper limits
Rewards Range:
Critical vulnerabilities examples:
SQL Injection, which could get massive customer information
Remote code execution on server side
Remote code execution on client app
Remote user sensitive information disclosure on client app
Privilege escalation affecting all users
Broken authentication affecting all users
SSRF to lark internal service, with extremely critical impact, such as being able to access internal sensitive data
And other critical severity issues
High vulnerabilities examples:
Privilege escalation affection part users
Broken authentication affection part users
SSRF to internal services of Lark
And other high severity issues
Medium vulnerabilities examples:
Privilege escalation affecting single user
Broken authentication affecting single user
XSS which could attack other Lark users
Logical vulnerabilities affecting sensitive operations
Remote denial of service or app crash
Information disclosure of service(with customer data)
Remote information disclosure on client app, like program memory, log, etc
Insecure storage of sensitive information on client app
And other medium severity issues
Low vulnerabilities examples:
Information leakage(without customer data)
Server misconfiguration or errors
Local denial of service or app crash
Local information disclosure on client app, like program memory, log, etc
And other low severity issues
Please refer to the rewards section for the bounty table. Our bounty table provides general guidelines, and all final decisions are at the discretion of Lark. We reserve the right to accept and review any security report including for out of scope issues, but we will not award a bounty for out of scope issues in fairness to other researchers who are adhering to program scope. This will be true regardless of the severity of the vulnerability.
Please note that these known issues will not be eligible for bounties:
Cross-Site Request Forgery (CSRF)
Cross-Origin Resource Sharing (CORS)
Clickjacking
We are working on a fix for the above issues and seek your kind patience.
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
Reports from automated tools or scans
False positive SQL Injection
Spam vulnerability, mail spoofing, mail bomb, etc.
Self-XSS
Use of known-vulnerable library or component
Clickjacking on pages with no sensitive actions
Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
Attacks requiring MITM or physical access to a user's device.
Previously known vulnerable libraries without a working Proof of Concept.
Comma Separated Values (CSV) injection without demonstrating a vulnerability.
Missing best practices in SSL/TLS configuration.
Any activity that could lead to the disruption of our service (DoS).
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Rate limiting or brute-force issues on non-authentication endpoints
Missing best practices in Content Security Policy.
Missing HttpOnly or Secure flags on cookies
Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)
Vulnerabilities only affecting users of outdated or unpatched browsers [Less than 2 stable versions behind the latest released stable version]
Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors).
Public Zero-day vulnerabilities that have had an official patch for less than 1 month will be awarded on a case by case basis.
Tabnabbing
Open redirect - unless an additional security impact can be demonstrated
Issues that require unlikely user interaction
Vulnerabilities that are already known (e.g. discovered by an internal team)
Best practice reports are not eligible for bounties but are appreciated.
Exposure of Google Maps API Key.
Notes about IDOR Vulnerabilities
Researchers must be able to prove a feasible way to gain an ID as an attacker and we will not accept reports where IDs are being brute forced.
Any URIs leaked because a malicious app has permission to view URIs opened
Sensitive data in URLs/request bodies when protected by TLS
Lack of obfuscation and binary protection
Any kind of sensitive data stored in app private directory
Runtime hacking exploits using tools like but not limited to Frida/ Appmon (exploits only possible in a jailbroken environment & root permission)
Shared links leaked through the system clipboard.
Intent or URL Redirection leading to phishing
Third party library 0day
Lack of Exploit mitigations i.e., PIE, ARC, or Stack Canaries
Absence of certificate pinning
Path disclosure in the binary
User data stored unencrypted in the app private directory
Lack of obfuscation is out of scope
Lack of jailbreak detection is out of scope
OAuth & app secret hard-coded/recoverable in IPA
Crashes due to malformed URL Schemes
Lack of binary protection (anti-debugging) controls
Snapshot/Pasteboard leakage
Runtime hacking exploits using tools like but not limited to Frida/ Appmon (exploits only possible in a jailbroken environment)
Third party library 0day is out of scope
URL Redirection leading to phishing
If you require any clarifications regarding the scope of the program (eg: potential Lark's user data leaking in one of our third-party vendors) or face specific challenges when testing, you may email the Lark Team at bugbounty@larksuite.com. Kindly also keep the Program Manager, muchfimuchfeelz@wearehackerone.com in the loop.
However, please do not escalate questions about the validity or bounties of your existing reports. Such emails will not be responded to and discussions should be done within the report itself. If you are unsure about a potential vulnerability, please submit the report to us and we will assess it accordingly.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Scope Type | Scope Name |
---|---|
application | Windows OS Executable: Download here https://www.larksuite.com/download |
application | Mac OS Executable: Download here https://www.larksuite.com/download |
ios_application | 1452166623 |
web_application | larksuite.com |
web_application | lark-frontier.byteoversea.com |
web_application | file.larksuite.com |
web_application | open.larksuite.com |
web_application | api.larksuite.com |
web_application | app.larksuite.com |
web_application | caldav.larksuite.com |
web_application | status.larksuite.com |
web_application | passport.larksuite.com |
web_application | internal-api.larksuite.com |
web_application | internal-api-lark-api.larksuite.com |
web_application | internal-api-drive-stream.larksuite.com |
web_application | com.larksuite.suite |
web_application | hackers_chosendomain.larksuite.com |
This program have been found on Hackerone on 2021-03-29.
FireBounty © 2015-2024