Razer looks forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe.
Razer will make a best effort to meet the following response targets for hackers participating in our program:
We’ll try to keep you informed about our progress throughout the process.
Our scopes are listed in the assets section below. Please refer to our bounty table regarding potential value. You may also see the valid systems listed in the "Instructions" section within the Scope section of the program.
Also please note that there are systems in the Razer.com domain or subdomains that are managed by third parties. Testing against those systems is not in scope. Examples of these out of scope systems include:
Systems determined to be development only may not receive a bounty.
To emphasize for clarity: only vulnerabilities for the assets listed here are bounty eligible. We may consider a bounty for other Razer properties but will make no guarantee of an award.
Razer ID authentication platform:
Razer Store:
Cortex platform:
Razer Gold platform:
Razer Gold Thailand:
Razer homepage:
Content servers:
Mobile servers:
THX primary websites:
*.thx.com
Code vulnerabilities in the Razer Merchant Services (MOLPay) Mobile SDK that could lead to a compromise of user data: https://www.molpay.com/v3/features/mobile-xdk/ __
Razer owned AWS S3 buckets
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug.
The following issues are considered out of the scope of the bounty program as standalone vulnerabilities:
Note that leveraging such vulnerabilities in combination to demonstrate customer PII data exfiltration in a PoC would be considered in scope.
The scope of this program will be strictly enforced, regardless of the potential security impact. Note that we may accept reports for out of scope vulnerabilities and possibly fix them, but we will not award a bounty regardless.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Razer and our users safe!
Scope Type | Scope Name |
---|---|
other | Razer properties not eligible for bounty |
other |
|
other |
|
other | Please refer to our bounty table for the list of eligible assets and the potential value. |
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application | |
web_application | |
web_application | |
web_application |
|
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application | |
web_application |
|
web_application |
|
web_application | |
web_application | |
web_application | https://play.google.com/store/apps/details?id=com.mol.molwallet&hl=None __ |
This program feature scope type like web_application.
FireBounty © 2015-2024