The Direction Interministérielle du NUMérique (DINUM) is in charge of the French State's digital transformation for the benefit of citizens and civil servants alike, in all its aspects:
It supports public services, advises the government and develops common resources such as the Inter-ministerial State Network (RIE) or the French eIDAS node (FranceConnect).
DINUM is developing the Tchap instant-messaging application. It is a end-to-end encrypted instant-messaging service dedicated to French administration. It is available with an Android and an iOS application, and a web interface available at https://www.tchap.gouv.fr. All of them exchange with the servers through an API at https://matrix.agent.*.tchap.gouv.fr and https://matrix.agent.tchap.gouv.fr.
The DINUM considers crucial to work with trusted and qualified security researchers to identify weaknesses in its applications, regardless of the technology used, and improve its assest security by leveraging the YWH community's motivation and skills.
If you believe you have found a security problem in our products or services we'll be happy to hear about it as well as to work with you on fixing it as quickly as possible.
Of course, we expect you to work in a responsible manner given out applications' contexts in order to avoid any interruption of service and to protect the privacy of our users. Thus, please do not try to over-exploit a bug, in doubt please contact us for further guidance.
As the French public state is committed to an open data approach, most of our applications' source codes are publicly available on GitHub . If proposals for fixes and improvements on the concerned GitHub project will be appreciated mind that reporting any security issue through this mean is forbidden.
Exploitation of vulnerabilities or misconception of the mobile application (IOS & Android) allowing extraction of information about the user, his messages or that may lead to deeper exploitation and compromission of the Tchap application are of particular interest to us.
Nevertheless, Tchap information stored in the phone mustn't be obtained neither via a rooted nor a jailbroken phone, but only via a malware-free phone, by using the means and permissions offered to any application. This kind of technics can still be used to retrieved confidential informations that the phone shouldn't have access to.
What are sensitive information for Tchap mobile Application :
A non-production environment is available to you so you may test our application as an authenticated user. Mind that if you find the same issue on both production and non-production environment you'll only be rewarded once.
You may self-register on https://www.beta.tchap.gouv.fr by using your YWH aliases.
The system provides multiple levels of access using roles. By default, your account have the role "user". You will be able to invite other emails from this account, they will be granted the "guest" role.
On https://www.beta.tchap.gouv.fr API endpoints are https://matrix.i.tchap.gouv.fr (for the account you will create) and https://matrix.e.tchap.gouv.fr/ (API for account with "guest" role) instead of https://matrix.agent.*.tchap.gouv.fr and https://matrix.agent.tchap.gouv.fr.
Our application is open source, the code can be found at https://github.com/tchapgouv for the clients and at https://github.com/matrix-org for the server.
Please do not notify security issues through GitHub. Notifications of publicly available issues will not be rewarded. Proposals of fix for security issues on the GitHub will be appreciated. Commit timing shall be discussed during the security issue evaluation process. Additional credits can be attributed in case of accepted pull request.
Here are the main repositories you may want to have a look at :
Note that several subdomains allow access through https://matrix.agent.*.tchap.gouv.fr and you can find them in the configuration file of the web frontend here
Please use your YWH aliases (*@yeswehack.ninja) whenever testing forms or contact features and, if possible, append the following message to free input fields (e.g. message body or comment) :
[Bug Bounty, please ignore - Contact Cybersecurity team if needed]
It'll help us triage your reports more seamlessly.
⚠️ To be eligible for the "specific scanerios" reward grid, your report must not leverage leaked user’s credentials found on a third-party website (e.g. key logger or malware database) and the content you have recovered must be readable, either in clear text or decrypted. All scenarios MUST follow others program rules.
The critical reward grid is only valid for the following scenarios :
DINUM believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our products or services, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Please avoid DDOSing us or causing any service disruption while testing our platform. And take care of not endangering the privacy or our members.
Do not try to over exploit the bug and access internal data for further vulnerabilities. We will determine the severity and reward accordingly.
Please adhere to the following rules while performing research on this program:
We are happy to thank everyone who submits valid reports which help us improve our security, however only those that meet the following eligibility requirements may receive a monetary reward:
Reward amounts are based on:
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and identified outside of our program’s scope, such as:
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behaviour (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers.
This excludes, but is not limited to:
Source of leak is in-scope | Source of leak belongs to our organization but is out-of-scope | Source of leak does not belong to our organization and is out-of-scope | |
---|---|---|---|
Impact is in-scope (e.g. valid credentials on an in-scope asset) | Eligible | Eligible | Not Eligible |
Impact is out-of-scope (e.g. valid credentials for an out-of-scope asset) | Eligible | Not Eligible | Not Eligible |
As a complement to the Program’s rules and testing policy :
Please note that we may modify the terms of this program or terminate it at any time.
Scope Type | Scope Name |
---|---|
android_application | https://play.google.com/store/apps/details?id=fr.gouv.tchap.a&hl=fr |
api | https://matrix.agent.*.tchap.gouv.fr |
api | https://matrix.i.tchap.gouv.fr |
api | https://matrix.e.tchap.gouv.fr |
api | https://matrix.agent.tchap.gouv.fr |
ios_application | https://apps.apple.com/fr/app/tchap/id1446253779 |
ios_application | Specific scenarios (see program description) |
web_application | https://www.tchap.gouv.fr |
web_application | https://www.beta.tchap.gouv.fr |
web_application | https://github.com/tchapgouv |
Scope Type | Scope Name |
---|---|
undefined | Everything that not listed as in scope is to be considered as out of scope of this program |
undefined | Please note that Tchap is hosted by a third party and thus vulnerabilities related to the host are out of the scope |
This program crawled on the 2024-01-19 is sorted as bounty.
FireBounty © 2015-2025