Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
BountyGraph logo
Hall of Fame



Program Rules

Our bug bounty program aims to discover any vulnerabilities in the BountyGraph platform and reward security researchers accordingly!

We are interested in vulnerabilities that have a clear impact on the security of our service, especially vulnerabilities that would allow an attacker to extract sensitive information from bug reports.


  • *


The following are out of scope and will not receive a bounty

  • Denial of service
  • Social engineering (including phishing) or physical attacks
  • Automated vulnerability scanner output
  • Attacks that would require physical access to the user's computer
  • Attacks that would require access to the user's email account
  • Homograph attacks


BountyGraph will determine whether a reported issue is considered a security vulnerability and assign it a severity rating of Low, Moderate, High, or Critical.

Depending on this rating, a valid report will pay out of the money raised so far, at roughly the percentages described in the table below.

Please remember that not all submissions will qualify for a bounty. Generally only the first valid report of a particular bug will be accepted, and the final decision of the bounty reward is at the discretion of the Panel.

BountyGraph Payout Policy

Bounties are paid to hackers and project maintainers at the discretion of the funding organizations and the BountyGraph team. To be eligible for a bounty, each submission must meet BountyGraph's report guidelines.

FireBounty © 2015-2019

Legal notices