176669 policies in database
Link to program      
2026-03-01
scale.com logo
Thank
Gift
HOF
Reward

scale.com

A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.

Contact: mailto:security@scale.com
Expires: 2025-06-07T15:45:00.000Z
Canonical: https://scale.com/.well-known/security.txt
Policy: https://scale.com/legal/security

Scale currently has a beta Bug Bounty program, the program is implemented via email at vulnerabilities@scale.com. Scale’s Bug Bounty program is intended to help us find high and critical vulnerabilities in our external infrastructure and core application. Included in the scope of Scale’s bug bounty is everything on the *.scale.com domain. That said, there are a number of attacks and vulnerability testing that is explicitly out of scope in our program. 

The following items should be considered out of scope:
Physical or social engineering attempts (this includes phishing attacks against Scale employees)
Ability to send push notifications/SMS messages/emails without the ability to change content
Ability to take over social media pages (Twitter, Facebook, Linkedin, etc)
Findings with negligible security impact
Unchained open redirects
Reports that state that software is out of date/vulnerable without a proof-of-concept
Highly speculative reports about theoretical damage
Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue
Reports from automated web vulnerability scanners (Acunetix, Vega, etc.) that have not been validated
SSL/TLS scan reports (ie: output from sites such as SSL Labs)
Open ports without an accompanying proof-of-concept demonstrating vulnerability
Subdomain takeovers - please demonstrate that you are able to take over the page by leaving a non-offensive message, such as your username
CSV injection
Best practices concerns
Protocol mismatch
Rate limiting
Exposed login panels
Dangling IPs
Vulnerabilities that cannot be used to exploit other users or Scale -- e.g. self-xss or having a user paste JavaScript into the browser console
Content injection issues
Missing cookie flags on non-authentication cookies
Cross-site Request Forgery (CSRF) with minimal security implications (Logout CSRF, etc.)
Reports that affect only outdated user agents or app versions -- we only consider exploits in the latest browser versions for Safari, FireFox, Chrome, Edge, IE and the versions of our application that are currently in the app stores
Issues that require physical access to a victim’s computer/device
Stack traces
Path disclosure
Directory listings
Banner grabbing issues (figuring out what web server we use, etc.)
If a site is abiding by the privacy policy, there is no vulnerability.
Enumeration/account oracles
UUID enumeration of any kind
Invite/Promo code enumeration
Gift card enumeration
Account oracles -- the ability to submit a phone number, email, UUID and receive back a message indicating an Scale account exists
Distributed denial of service attacks (DDOS)
 
High quality submissions allow our team to understand the issue better and engage the appropriate teams to fix. The best reports provide enough actionable information to verify and validate the issue without requiring any follow up questions for more information or clarification.
Check the scope before you begin writing your report to ensure the issue you are reporting is in scope for the program.
Think through the attack scenario and exploitability of the vulnerability and provide as many clear details as possible for our team to reproduce the issue (include screenshots if possible).
Please include your understanding of the security impact of the issue. Our bounty payouts are directly tied to security impact, so the more detail you can provide, the better. We cannot payout after the fact if we don’t have evidence and a mutual understanding of security impact.
In some cases, it may not be possible to have all of the context on the impact of a bug. If you’re unsure of the direct impact, but feel you may have found something interesting, feel free to submit a detailed report and ask.
Video only proof-of-concepts (PoCs) will not be considered.
A vulnerability must be verifiable and reproducible for us to be considered in-scope.
All reports must demonstrate security impact to be considered for bounty reward.
Include a CVSS hash supporting the severity of the vulnerability you are reporting.
More guidance on writing high quality reports can be found here: https://docs.hackerone.com/hackers/quality-reports.html

The following ratings are based on the CVSS v3 security scale, and are our general vulnerability payout scale:
Informational: No payout
Low - Medium: 0-$100 and Hall of Fame thanks
High - Critical: $100-$500 and Hall of Fame thanks

Previous bounty amounts are not considered a precedent for future bounty amounts. Bounty awards are not additive and are subject to change as our internal environment evolves. We determine the upper bound for security impact and award based on that impact. When determining bounty amounts, we consider the security impact of any given issue -- things that influence security impact are the scale of exposure and the various mitigating and multiplying factors. Bounty payouts and amounts, if any, will be determined by us in our sole discretion. In no event are we obligated to provide a payout for any submission. The format, currency and timing of all bounty payouts shall be determined by us in our sole discretion. You are solely responsible for any tax implications related to any bounty payouts you may receive. If we receive several reports for the same issue, only the earliest valid report that meets requirements and provides enough actionable information to identify the issue may be considered for a bounty.

Further, you understand that your participation in the program is at your own risk. To the fullest extent permitted by applicable law, except as otherwise provided herein, in no event shall Scale, its affiliates or their employees, contractors, agents, officers or directors be liable to you or the entity through which you are participating in Scale’s bug bounty program for any indirect, punitive, incidental, special, consequential or exemplary damages, including without limitation damages for business interruption, loss of profits, goodwill, use, data or other intangible losses arising out of or relating to this program. If you have any basis for recovering damages in connection with the program (including breach of these terms), you agree that your exclusive remedy is to recover, from Scale or any affiliates, resellers, distributors, and vendors direct damages up to but not in excess of $200.00 (USD). The exclusions and limitations in this section apply whether the alleged liability is based on contract, tort, negligence, strict liability or any other basis, even if the non-breaching party has been advised of the possibility of such damage.



Hall of Fame Reports:
February 11, 2025 - Sourish Das
November 7, 2024 - Mehrab Hossein Opi
October 4, 2024 - Javeed Shaik
September 30, 2024 - Mridul Vohra
June 17, 2024 - Sterling Wright
April 3, 2023 - Gia Bui & An Trinh with Calif Inc. (https://calif.io)

This policy crawled by Onyphe on the 2026-03-01 is sorted as securitytxt.

FireBounty © 2015-2026

Legal notices | Privacy policy