Paddle.com Market Limited (and our subsidiaries) ("Paddle", or the "Company") offers SaaS companies a completely different approach to their payments infrastructure. Instead of assembling and maintaining a complex stack of payments-related apps and services, we're a merchant of record for our customers, taking away 100% of the pain of payments fragmentation. It's faster, safer, simpler, and above all, way better.
At Paddle we recognise the important role that security researchers play in helping to keep the Company and our customers secure. The goal of this Bug Bounty Program is to continuously improve our security posture at Paddle.
By participating in this Program, you acknowledge that you have read and agreed to these Program rules.
We ask you to respect the scope of our program and to not hunt outside of it. Should you need to report anything outside of the scope of this program you may do so through our VDP program here https://vdp.paddle.com.
For any in-scope endpoint marked with "(and sandbox)", an equivalent sandbox environment is available by prefixing sandbox- to the domain (for example, vendors.paddle.com has a sandbox version at sandbox-vendors.paddle.com).
Our production and sandbox environments are equivalent and run the same code, so a vulnerability on one should be present on the other. Thus the same valid vulnerability uncovered both on sandbox and production environments will only warrant a single reward and should be reported through the same report.
The sandbox environment does not process real payments, nor do the test transactions that flow through it have any tax implications. Tests which involve financial transactions must not be carried out on the production environment. There are test cards which can be used on the sandbox environment to simulate a real purchase. To ensure you are able to test the full Paddle platform, please focus on testing on our sandbox environment.
This is our main website, providing company and product information to our customers and stakeholders.
This is our vendor dashboard application, providing self-service access to configuration for Paddle's products.
Please note that specific testing precautions apply to the production environment, see above.
This is the entrypoint to Paddle’s API platform. Documentation is listed below under the API Reference link.
As documented above (see "Sandbox environment"), tests on the following two endpoints are only permitted on the sandbox environment.
This is our developer documentation website.
The following sections of our documentation may be useful as you test the platform:
We're aware of various behaviours around MFA and email addresses verifications that you may consider reporting through our program. Those are known to us and by design as to improve user experience and foster a smoother onboarding process, they won't warrant a reward.
You may stumble upon features or pages that are not accessible from the UI but may still be interacted with through direct requests. This is often by design as they're legitimate features/pages that are hidden to foster a better user experience and clearer UI. Reports about it won't warrant any reward. An example of this is with the “Invoicing” role, where some pages such as “Customers” cannot be viewed, but the role still allows access to manage customers (and indeed this can be done directly on the “Invoices” page.
Participants are permitted to perform tests and investigations on Paddle's systems, as long as they act in good faith and respect the scope and rules described below. This Program does not give you permission to act in any manner that is inconsistent with the law, or which might cause the Company or partner companies to be in breach of any legal obligations.
Paddle believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our products or services, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Please adhere to the following rules while performing research on this program:
We are happy to thank everyone who submits valid reports which help us improve our security, however only those that meet the following eligibility requirements may receive a monetary reward:
Reward amounts are based on:
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and identified outside of our program’s scope, such as:
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behaviour (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers.
This excludes, but is not limited to:
Source of leak is in-scope | Source of leak belongs to our organization but is out-of-scope | Source of leak does not belong to our organization and is out-of-scope | |
---|---|---|---|
Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible | Eligible | Not Eligible |
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible | Not Eligible | Not Eligible |
As a complement to the Program’s rules and testing policy :
The use of third-party sites or tools for vulnerability testing is prohibited (for instance - XSS Hunter or its variants). We ask you to only use assets that you own/control for the purpose of your tests (e.g. self hosted versions of tools like XSS Hunter are allowed). Please make sure that all traffic goes through domains only you have control over, failing to comply with these guidelines may result in forfeiture of any reward.
Scope Type | Scope Name |
---|---|
api | https://api.paddle.com |
api | https://sandbox-api.paddle.com |
web_application | https://vendors.paddle.com |
web_application | https://sandbox-vendors.paddle.com |
web_application | https://sandbox-checkout-service.paddle.com |
web_application | https://sandbox-buy.paddle.com |
web_application | https://paddle.net |
web_application | https://customer-portal.paddle.com |
web_application | https://login.paddle.com |
web_application | https://sandbox-login.paddle.com |
web_application | https://www.paddle.com |
web_application | https://developer.paddle.com |
Scope Type | Scope Name |
---|---|
undefined | All domains, subdomains or assets not listed in the above list of 'Scopes' must be considered as out of the scope of this program |
web_application | https://checkout-service.paddle.com |
web_application | https://buy.paddle.com |
This program crawled on the 2025-04-22 is sorted as bounty.
FireBounty © 2015-2025