52212 policies in database
Link to program      
2021-09-30
DataDome Bug Bounty logo
Thank
Gift
HOF
Reward

Reward

DataDome Bug Bounty

Scope

The scope of the bug bounty is :

Function Domain
Customer Dashboard app.datadome.co
Customer API customer-api.datadome.co
Java Script js.datadome.co
Captcha *.captcha-delivery.co
Server Site API used by modules api.datadome.co
Client Side API used by JS or SDK api-js.datadome.co
Corporate Site datadome.co or www.datadome.co
Server-Side modules (in customer infrastructure) docs.datadome.co
Authentication auth.datadome.co

You can find all the information you need about DataDome on https://docs.datadome.co/docs
readme.com third-party is out of scope

auth.datadome.co is managed by Auth0 Third-Party, only DataDome direct vulnerability will be rewarded

Keep in mind this is a production environment, no data alterations are allowed inside DataDome infrastructure or on DataDome customer Cloud infrastructure, and, therefore, you must not affect the availability of the platform.

Testing Policy and Responsible Disclosure

Please adhere to the following rules while performing research on this program:

  • Denial of service (DoS) attacks on DataDome applications, servers, networks or infrastructure are strictly forbidden.
  • Avoid tests that could cause degradation or interruption of our services.
  • Do not use automated scanners or tools that generate a large amount of network traffic.
  • Only perform tests against your own accounts to protect our users' privacy.
  • Do not leak, manipulate, or destroy any user data or files in any of our applications/servers.
  • Do not copy any files from our applications/servers and disclose them.
  • No vulnerability disclosure, full, partial or otherwise, is allowed.

Reward Eligibility

We are happy to thank everyone who submits valid reports which help us improve the security of DataDome, however only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability.
  • The vulnerability must be a qualifying vulnerability (see below).
  • The report must contain the following elements:
  • Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and DataDome, and remediation advice on fixing the vulnerability.
  • Proof of exploitation: screenshots and/or videos demonstrating the exploit was performed, and showing the final impact.
  • Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
  • You must not break any of the testing policy rules listed above
  • You must not be a former or current employee of DataDome or one of its contractors.

Our security team will review each committed finding and establish communication as soon as possible to reproduce and solve the reported vulnerability. Please allow 5 working days for our initial response. We ask you to make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research.

In Scope

Scope Type Scope Name
api

https://customer-api.datadome.co

api

https://api.datadome.co

api

https://api-js.datadome.co

web_application

https://app.datadome.co

web_application

https://datadome.co

web_application

https://*.captcha-delivery.com

web_application

https://auth.datadome.co

web_application

https://bot-tester.datadome.co/

Out of Scope

Scope Type Scope Name
undefined

All domains not listed In-Scope

undefined

Third-party widgets on www.datadome.co and app.datadome.co


Firebounty have crawled on 2021-09-30 the program DataDome Bug Bounty on the platform Yeswehack.

FireBounty © 2015-2024

Legal notices | Privacy policy