Quantopian inspires talented people everywhere to write investment algorithms. Select authors may license their algorithms to us and get paid based on performance.
At the heart of Quantopian is a Python algorithmic trading platform called Zipline . Our members' Python code running on our platform presents a unique security challenge.
Our highest security priority is protecting the private data and intellectual property of our members and the funds the partners who invest money through us.
IMPORTANT: Any account created at https://www.quantopian.com/ for security testing should have the string"hackerone" somewhere in the local part of its email address, i.e., the part before the "@". On many email platforms you can achieve this by appending "+hackerone" to the end of your username. The reason for this is explained in the description of the www.quantopian.com scope, below.
Please try to include the following on your reports:
The Basics
-- > We need more! <--
downtime, you run the risk of being ineligible to submit to the Quantopian program.
While researching, please refrain from:
You can always email security@quantopian.com with questions or concerns about our program.
Please notify security@quantopian.com in advance if you intend to probe the security of our algorithm code execution environment, so that we can respond appropriately if our monitoring detects and notifies us about your testing or your testing triggers our automated guards.
Please don't submit reports about:
We are not interested in any issues pertaining to our site's default rate limits unless there is a specific user-facing impact to that limit. We strive to keep our rate limits out of the minds of our users, so we have intentionally made them rather lenient.
The only rate limit related reports we will review must have an impact beyond Denial-of-Service attacks. Examples:
Any testing of our rate limits should stay within our 15 requests-per-minute guideline. This is below our overall site rate limit, but should be sufficient for testing issues with extra impact (such as the examples above).
Any rate limit testing of site behaviors that send notifications to Quantopian employees must be approved by Quantopian program administrators first.
Our bounties usually range from $100 to $5,000. We rate reported vulnerabilities in five categories; these ratings are combined formulaically to arrive at a bounty amount. In some circumstances, we may find it necessary adjust the bounty amount determined by our formula, but we try to stick with the formula's results whenever possible.
0 = No impact and 4 = Critical
0 ”cookie-cutter” vulnerability, or one that is tested automatically by
widely available tools.
1 easy to stumble across in normal usage of the site
2 easy to find if you are looking for it
3 requires work to discover and in-depth knowledge
4 requires work to discover and in-depth knowledge to understand
Ease of exploitation
0 impossible to exploit in any meaningful way
1 impossible to exploit unless combined with another vulnerability
2 extremely hard to exploit
3 straightforward but not easy to exploit
4 extremely easy to exploit
Impact on members who write, test, and trade algorithms through quantopian
0 no user impact
1 very little likely impact, almost not a security issue
2 compromise user private data but not their intellectual property
3 compromise user intellectual property
4 complete user account takeover
Impact on Quantopian’s money-management business
0 no impact.
1 very little likely impact, almost not a security issue
2 localized compromise of data
3 broad compromise of data
4 compromise of money
Stealthiness
0 exploitation would definitely be detected and thwarted quickly without
damage or disruption
1 would be detected and thwarted eventually without site disruption
2 could go undetected _or site disruption would be necessary to stop it_
3 could go undetected _and site disruption would be necessary to stop
it_
4 would likely go undetected for a long time
The rating scales above are provided only for informational purposes. Reported vulnerabilities are rated by us , not by the researchers reporting them. When reporting a vulnerability to us, you should not attempt to rate it according to the scales above. If you believe that we have misunderstood the scope or severity of a vulnerability, we encourage you to explain why; however, its severity rating is solely at our discretion and not up for debate.
posting new threads or comments in our forums, then please put the string "qsectest" somewhere in the body of each of your test postings so that we can detect that they are test posts and not email them to our members
Please check out some of our previous reports to better understand how to explain the impact of your find and earn higher bounties.
World-writable S3 bucket used for deployment of Python wheels to our application servers. A bad actor could have tampered with the wheels in this bucket to introduce malicious code onto our servers. We ranked this report 3 out of 4 on ease of discovery, 2/4 on exploitability, 4/4 on user impact, 4/4 on fund impact, and 3/4 on stealthiness, resulting in a bounty of $3,125.
Authorization not being enforced properly for collaboration. A bad actor could have exploited this vulnerability to gain access to the chat sessions and portions of the algorithm source code of other users' collaboration-enabled algorithms. We ranked this report 4/4 on ease of discovery, 2/4 on exploitability, 3/4 on user impact, 2/4 on fund impact, and 3/4 on stealthiness, resulting in a bounty of $2,425.
Stored XSS in algorithm name when a collaborator attempts to delete the algorithm. A bad actor would have had to insert XSS code into the algorithm title (which would have been visible to the collaborator) and then somehow get the collaborator to attempt to delete the algorithm. We ranked this report 3/4 on ease of discovery, 2/4 on exploitability, 3/4 on user impact, 1/4 on fund impact, and 2/4 on stealthiness, resulting in a bounty of $1,500.
Rate limiting on account confirmation emails not working. A bad actor could have exploited this to flood any email address with emails from Quantopian and in the process run up Quantopian's bill with our email service provider. We ranked this report 2/4 on discoverability, 3/4 on exploitability, 1/4 on user impact, 0/4 on fund impact, and 0/4 on stealthiness, resulting in a bounty of $325.
We usually send an initial response to vulnerability reports within two business days. Feel free to ping us if you don't hear back within two days of submitting a report.
We triage most reports, i.e., reproduce them and determine their severity, before our initial response. If we are unable to do so, our initial response includes either an estimate of when we believe we will be able to triage it, or a request for additional information we need from the reporter.
We try to pay the bounty for a report within 30 days of our severity determination or within 7 days after we have closed the vulnerability, whichever is sooner. If we're late, please let us know.
While we are grateful to everyone who submits vulnerability reports to us, reports must satisfy the following criteria to be eligible for a bounty:
Bounties are paid at our sole and complete discretion, and we reserve the right not to pay a bounty for an eligible report, for any reason or no reason.
We may modify the terms of this program or terminate the program at any time without prior notice.
defined security impact. ←**
Here is what that means:
Please do not submit reports of the type, "I ran this security scanner on your site and it says your site is vulnerable to X, so it must be vulnerable to X!" Security scanners return false positives all the time.
Please do not submit reports of the type, "I'm reading this script off of the internet which says to check for X in responses from a web server, and your server returns X, so it must be vulnerable."
For a report to be useful to us, it must:
Furthermore, please note that we specifically do not wish to receive reports about:
When submitting reports via email:
While researching, please refrain from:
Scope Type | Scope Name |
---|---|
web_application | *.dynoquant.com |
web_application | *.quantshack.com |
web_application | www.quantopian.com |
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application |
|
web_application | |
web_application |
Scope Type | Scope Name |
---|---|
web_application | status.quantopian.com |
web_application | factset.quantopian.com |
web_application | enterprise.quantopian.com |
Firebounty have crawled on 2018-05-23 the program Quantopian on the platform Hackerone.
FireBounty © 2015-2024