52235 policies in database
Link to program      
2021-07-29
Stripe logo
Thank
Gift
HOF
Reward

Reward

Stripe

The Stripe Bug Bounty Program Terms and Conditions ("Terms") governs your participation in the Stripe Bug Bounty Program (the "Program"). These Terms are between you and Stripe ("Stripe," "us," or "we"). By submitting any vulnerabilities to Stripe or otherwise participating in the Program in any manner, you accept these Terms.

Program Eligibility

Participants must be at least 18 years old.

Stripe employees and contractors, as well as their family members, are strictly prohibited from participating in the Program, or sharing information with an external security researcher to bypass this prohibition.

You are prohibited from participating in the program if you are a resident of any U.S. embargoed jurisdiction, including, but not limited to, Iran, North Korea, Cuba, the Crimea region, and Syria; or if you are on the U.S. Treasury Department's list of Specially Designated Nationals or the U.S. Department of Commerce Denied Persons List or Entity List. By participating in the program, you represent and warrant that you are not located in any such country or on any such list.

Those who meet the eligibility requirements above and discover a potential security finding within Stripe products or services can submit a report to the Program.

Rules of Engagement

Your participation in our program is voluntary and subject to the following:

  • You must include a working Proof of Concept.

  • You must not threaten or try to extort Stripe.

  • You must not access, modify, copy, download, delete, compromise, or otherwise misuse others’ data.

  • You must not access non-public information without authorization.

  • You must not degrade, interrupt, or deny services to our users.

  • You must not incur loss of funds that are not your own.

  • If you are performing research, you must use your own accounts and not interact with other users’ accounts or data.

  • You must not leverage the existence of a vulnerability or access to sensitive or confidential data to make threats, extortionate demands, or ransom requests.

  • Your testing must not violate any applicable laws or regulations.

  • You will be responsible for any tax implications related to any bounty payment you receive, as determined by the laws of your jurisdiction.

  • By reporting a vulnerability, you grant Stripe and its affiliates a perpetual, irrevocable, worldwide, royalty-free license to use, copy, adapt, develop, create derivative work from, or share your submission for any purpose. You waive all claims, including breach of contract or implied-in-fact contract, arising out of your submission.

  • By reporting a vulnerability, you agree to allow HackerOne to share with Stripe the personal information that you provide to HackerOne relating to your tax forms so that Stripe can perform compliance checks.

  • Whether to provide a payment for the disclosure of a bug and the amount of the payment is entirely at our discretion.

  • Only the earliest, responsibly-disclosed submission of a vulnerability instance with enough actionable information to identify the issue will be marked as valid. All other reports for a given issue will not be eligible for a reward under our program.

Submission Review Process

After a submission is sent to Stripe in accordance with the Rules of Engagement described above, Stripe engineers will review the submission and validate its eligibility. The review time will vary depending on the complexity and completeness of your submission, as well as on the number of submissions we receive.

Stripe retains sole discretion in determining which submissions are qualified. If we receive multiple bug reports for the same issue from different parties, the bounty will be granted to the first eligible submission. If a duplicate report provides new information that was previously unknown to Stripe, we may award a differential to the person submitting the duplicate report. Stripe will also reopen and reward any report mistakenly closed as invalid if we later receive and reward the same bug reported by someone else. In these situations, we pay both researchers.

Creating Accounts for Vulnerability Research

You must create your own account using a HackerOne email address (username@WeAreHackerOne.com) to help us track security research activity.

When opening your own merchant account, please add “bug-bounty” to the end of the merchant name.

Ineligible Vulnerabilities

When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug.

Below are some examples of issues that are out of scope for the Stripe Bug Bounty Program:

  • Account squatting by preventing users from registering with certain email addresses

  • Attacks requiring MITM or physical access to a user's device

  • Best practice reports without a valid exploit (e.g., use of "weak" TLS ciphers)

  • Clickjacking on pages with no sensitive actions

  • Comma Separated Values (CSV) injection without demonstrating a vulnerability

  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS

  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions

  • Denial of service

  • Disclosure of server or software version numbers

  • Hypothetical subdomain takeovers without supporting evidence

  • Issues that are premised on unlikely user interaction

  • Missing best practices in Content Security Policy

  • Missing best practices in SSL/TLS configuration

  • Missing email best practices (invalid, incomplete or missing SPF/DKIM/DMARC records, etc.)

  • Missing HttpOnly or Secure flags on cookies

  • Open redirect - unless an additional security impact can be demonstrated

  • Perceived security weaknesses without concrete evidence of the ability to compromise a user (e.g., missing rate limits, missing headers, etc.)

  • Previously known vulnerable libraries without a working Proof-of-Concept

  • Public Zero-day vulnerabilities that have had an official patch for less than 1 month will be awarded on a case by case basis

  • Rate limiting or bruteforce issues on non-authentication endpoints

  • Reports exploiting the behavior of, or vulnerabilities in, outdated browsers

  • Reports of spam

  • Self-XSS

  • Session invalidation or other improved-security related to account management when a credential is already known (e.g., password reset link does not immediately expire, adding MFA does not expire other sessions, etc.)

  • Social engineering

  • Software version disclosure / Banner identification issues / Descriptive error messages or headers (e.g. stack traces, application or server errors)

  • Tabnabbing

  • Unconfirmed reports from automated vulnerability scanners

  • User/merchant enumeration

  • Vulnerabilities only affecting users of outdated or unpatched browsers (less than 2 stable versions behind the latest released stable version)

Other notes on submission eligibility

  • Please note that we do accept and reward submissions for valid cross-site scripting vulnerabilities even if they are not accompanied by a bypass of our content security policy. Cross-site scripting vulnerabilities without a content security bypass will be assessed at a lower severity level than those with a bypass.

Disclosure

By participating in this program, you agree not to publicly or privately disclose the contents of your submission, your findings, your communications with Stripe related to your participation in the Program, or any facts you have learned about Stripe in the course of your participation in the Program to any third parties without Stripe’s prior written approval. There are no exceptions.

Personal Data

You must never attempt to access personal data that belongs to others, whether by exploiting a vulnerability or not. If, during your testing, you interacted with or obtained access to personal data of others, you must:

  • Stop your testing immediately and cease any activity that involves the data or the vulnerability;

  • Do not save, copy, store, transfer, disclose, or otherwise retain the data; and

  • Alert Stripe immediately and support our investigation and mitigation efforts.

Failure to comply with this section will immediately disqualify any report from bounty award eligibility.

Privacy

To protect your privacy, we will not, unless served with legal process or to address a violation of this policy:

  • Share your personally identifiable information with third parties

  • Share your research without your permission

  • Share your participation without your permission

Accountability

Stripe reserves the right to disqualify you from participating in the Program if you violate the Rules of Engagement or other rules specified in this program policy, including the rules about disclosure.

Changes to the Terms

We may change the Terms at any time. Participating in the Program after the changes become effective means you agree to the new Terms. If you don't agree to the new Terms, you must not participate in the Program.

If you wish to opt out of the Program, please contact us at security@stripe.com.

In Scope

Scope Type Scope Name
android_application

com.stripe.android.dashboard

ios_application

978516833

other

Stripe Payments

other

Stripe Checkout

other

Stripe Connect

other

Stripe Terminal

other

Stripe Billing

other

Stripe Elements

other

Stripe Dashboard

other

Stripe Issuing

other

Stripe Radar

other

Stripe Sigma

other

Stripe Atlas

other

Stripe SDKs

other

Stripe Open Source

web_application

api.stripe.com

web_application

*.stripe.com

web_application

*.payable.com

web_application

*.touchtechpayments.com

web_application

*.indiehackers.com

web_application

js.stripe.com

web_application

api.taxjar.com

web_application

app.taxjar.com

web_application

*.getbouncer.com

web_application

*.recko.io

web_application

*.reckoproduction.com

web_application

*.reckostaging.com

web_application

*.link.co

web_application

www.stripe.partners


Firebounty have crawled on 2021-07-29 the program Stripe on the platform Hackerone.

FireBounty © 2015-2024

Legal notices | Privacy policy