Please keep the testing scope only* .app.spacelift.dev and spacelift.dev are included Please do not test the contact forms (especially HubSpot one)
Native K8S workers to manage these worker pools efficiently and K8S operators to manage Spacelift resources.
Reference: https://docs.spacelift.io/vendors/kubernetes/getting-started
Reference: https://docs.spacelift.io/integrations/kubernetes/operator
The OIDC-based API keys can be used as an alternative to secret-based ones today.
Reference: https://docs.spacelift.io/integrations/api.html#oidc-based-api-keys
The MFA feature allows you to protect your external IdP session using security keys (FIDO2) managed in Spacelift. Even if your IDP account is compromised, it brings your identity as the last line of defense.
Reference: https://spacelift-user-documentation-pr-396.onrender.com/product/security/mfa.html#multi-factor-authentication-mfa
For those features, all payouts will be increased by 20%
At Spacelift, your security is our first and foremost priority. We're aware of the utmost importance of security in our service, and we're grateful for your trust. Here's what we're doing to earn and maintain this trust and to keep Spacelift secure by design. If you have information about a qualified security vulnerability that is within our predetermined scope, we would love to hear from you!
In-scope vulnerabilities will be rewarded based on severity following remediation. The Spacelift private bug bounty program accepts vulnerability reports containing original and validated vulnerabilities that a potential attacker could use to compromise the confidentiality, integrity, and or availability of the services in scope. By participating in the Spacelift private bounty program you agree to follow all of the requirements below. We look forward to working with you to find security vulnerabilities in order to keep our businesses and customers safe. We’ll try to keep you informed about our progress throughout the process.
We offer a reward for every report of a security problem that was not yet known to us. The amount of the reward will be determined based on the severity of the leak and the quality of the report. Our rewards are based on severity per CVSS v3.0 (the Common Vulnerability Scoring Standard). Please note these are general guidelines and that reward decisions are up to the discretion of Spacelift.
Please adhere to the following rules while performing research on this program:
Submission Requirements
Reward amounts are based on:
You can check our documentation here
Scope Type | Scope Name |
---|---|
application | MFA |
application | Native K8S workers and operator |
application | OIDC-based API keys |
web_application | https://*.app.spacelift.dev |
web_application | https://spacelift.dev/ |
Scope Type | Scope Name |
---|---|
undefined | Contact form (especially HubSpot ones) |
undefined | Any other Spacelift assets not specifically listed as in-scope. |
undefined | Any communication with Spacelift colleagues. |
undefined | Attacks against any account other than the specified target accounts. |
undefined | Data breaches or credential dumps. |
undefined | Third-party companies that perform business transactions for Spacelift |
undefined | Session keeps using old user group permissions if user group permissions are changed during a given session's lifespan |
This policy crawled by Onyphe on the 2023-06-13 is sorted as bounty.
FireBounty © 2015-2025