Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
11/04/2018 logo
Hall of Fame


1000 ¥


Sprout have prepared verification environment to perform tests. Perform tests only against verification environment.

Please note that all corporate functions are excluded.
Reports of test performed outside of verification environment are not eligible for bounty rewards.
Only functions available to researchers are in-scope for the BugBounty website.

The verification environment is temporarily suspended. Please refrain from the inspection for the production environment.
If there is something need to report immediately, please report to this program.


Web application






Eligible For Bounty

  • Authentication up to 500,000yen
  • Remote Code Execution up to 500,000yen
  • SQL Injection up to 300,000yen
  • Cross-Site Scripting up to 100,000yen
  • Cross-Site Request Forgery (CSRF) up to 50,000yen
  • other up to 50,000yen

Not Eligible For Bounty

  • Vulnerabilities found through automated scans or tools
  • Hypothetical or theoretical vulnerabilities without actual verification code
  • Vulnerabilities with capability of Denial of Service attack
  • Vulnerabilities with capability of brute force against password or tokens
  • Password, email and account policies, such as email id verification, reset link expiration, password complexity
  • Login/Logout CSRF
  • Missing CSRF tokens
  • CSRF on forms that are available to anonymous users (e.g. contact form)
  • Missing security headers
  • Vulnerabilities found in domains out-of-scope
  • Vulnerabilities affecting outdated browsers or platforms
  • Presence of autocomplete attribute on web forms
  • Missing secure flags on non-sensitive cookies
  • Reports of insecure SSL/TLS ciphers
  • Vulnerabilities with capability of username/email enumeration
  • Descriptive error messages (e.g. Stack traces, application or server errors)
  • Banner disclosure on servers
  • Misconfiguration of SPF record, DMARC and DKIM
  • Invalid HTTP method
  • Textインジェクションによりエラー内容の操作が可能であるという脆弱性
  • 新規登録フォーム、パスワードを忘れた場合のフォームのレート制限の欠如(Lack of rate limit of registration and password reset)


To participate in this Bug Bounty Program, you must satisfy the following requirements:

(1) You have never carried out any project related with Sprout Inc.

For eligibility other than listed above, please refer to the "Terms of Service Article 4" of this site.

In Scope

Scope Type Scope Name


This program have been found on Bugbounty.Jp on 2018-04-11.

FireBounty © 2015-2019

Legal notices