46829 policies in database
Link to program      
2016-08-09
2019-08-03
Instacart logo
Thank
Gift
HOF
Reward

Reward

Instacart

Table of Contents

  1. Rules & Terms

  2. Vulnerability Types

    1. Out-of-Scope

    2. Known Issues

  3. Assets

    1. Core Assets

    2. Out-of-Scope

  4. Rewards

  5. Eligibility

  6. Payout Amounts

  7. Additional Factors

  8. Google Play Security Reward Program

  9. Submissions

  10. Report Quality

  11. Demonstrating Impact

  12. Attribution

  13. Automated Tools

  14. Transparency

  15. Triage Process

  16. Payout Process

  17. Feedback


Rules

In order to be considered for a reward, the following rules of engagement must be adhered to during testing. However, the golden rule you must follow is that you must not disrupt, compromise, destroy data, or interrupt or degrade our services. You must only interact with accounts you own or those for which you have the explicit permission of the account holder.

Additionally, while hunting for bugs, please refrain from the following activities:

  • Testing for DoS issues, or any kind of issue which could affect the experience of other Instacart users

  • Using automated tools which generate significant traffic

  • Accessing another user’s data or other private information

  • Attempting to social engineer or spam Instacart employees, shoppers or other users

  • Submitting reports from automated tools without any verification

If you have found an issue, do not attempt to pivot or escalate access - Instacart will perform analysis to determine the maximum possible impact a submission has, you do not need to do this for us.

Vulnerability Types

Out-of-Scope

Generally, a submission is eligible for a reward, regardless of vulnerability type, if it has clear security or privacy impact.

However, the following types are typically not eligible for a reward and we therefore recommend not hunting for:

  • General

    • Security best practices and other non-exploitable issues

    • Vulnerabilities only affecting users of outdated or unpatched browsers and platforms

    • Social engineering

  • Web Applications

    • Content spoofing

    • Password and account recovery policies, such as reset link expiration or password complexity

    • Reflected file download (RFD)

    • CSV injection

    • Email/username enumeration

    • Disclosure of files/paths within robots.txt

  • Mobile

    • Attacks requiring physical access to a user's device

    • Embedded client-side API keys which are intended to be used by our applications

    • Old versions of mobile applications no longer available through Google Play Store or iOS App Store

  • Infrastructure

    • DNS poisoning

Additionally, the following vulnerabilities won’t be eligible without further proof of security impact:

  • General

    • Known vulnerable libraries
  • Web Applications

    • Login & logout CSRF, and missing CSRF protection in general

    • Clickjacking

    • Missing security headers

  • Infra

    • SPF/DKIM configuration issues

    • SSL/TLS configuration issues

    • S3 ACL issues without proof that the bucket is owned by Instacart

Known Issues

Going forward, this section will be used to list any long-standing issues that we’re already aware of.

Assets

Any system or service listed under *.instacart.com or *.instacart.tools is within scope for the program, except where noted.

If you believe you have found an issue which affects Instacart but is not listed within scope, we ask that you still report it to us for consideration, but we do not recommend you look for these issues as they are likely to be ineligible.

Additionally, given that DNS records change frequently, and EC2 IP addresses may be recycled, you should attempt to verify that the service is still maintained by Instacart.

Core Assets

The following assets are considered “core assets” within the program:

  • Web

    • www.instacart.com (http://www.instacart.com/)

    • api.instacart.com (http://api.instacart.com/)

    • admin.instacart.com (http://admin.instacart.com/)

  • Mobile (Android)

    • Customers (com.instacart.client)

    • Shoppers (see https://shoppers.instacart.com/apps)

  • Mobile (iOS)

    • Customers (545599256)

    • Shoppers (see https://shoppers.instacart.com/apps)

Out-of-Scope

Systems or services which are not owned or maintained by Instacart, such as third-party blogs or micro-sites, are not eligible, and we can’t give you permission to test against. These include (but not limited to):

  • brand.instacart.com

  • careers.instacart.com and www.careers.instacart.com

  • carrotstore.instacart.com and www.carrotstore.instacart.com

  • corporate.instacart.com

  • covidresponse.instacart.com

  • design.instacart.com and www.design.instacart.com

  • *.email.instacart.com

  • enterprise-status.instacart.com

  • life.instacart.com and www.life.instacart.com

  • news.instacart.com and www.news.instacart.com

  • tech.instacart.com and www.tech.instacart.com


Rewards

Eligibility

We appreciate and thank everyone who submits valid reports that help us improve the security of Instacart!

However, only those that meet the following eligibility requirements may receive a monetary reward:

  • You must be the first reporter of a vulnerability

  • The vulnerability must be associated with a site or application in scope

  • The vulnerability should be exploitable - used to affect the confidentiality, integrity, authenticity, and safety of our data, applications, systems, applications or users

  • You must disclose the vulnerability report directly and exclusively to us

  • You may not publicly disclose the vulnerability prior to our resolution or approval

  • We can be legally prohibited from rewarding you (for example, you can’t be a resident of or located within Cuba, Sudan, North Korea, Iran or Syria a national of other certain countries, or on a denied parties or sanctions list)

Instacart reserves the right to decide the bounty amount and whether the vulnerability was previously reported. Instacart also reserves the right to change or discontinue its bug bounty program at any time without notice in its sole discretion.

Payout Amounts

The following table lists the typical maximum reward depending on submission severity:

| Severity | Maximum Bounty | Example Issues

| ------------------ | ------------ | ------------ |

|Critical | $20,000 | Remote Code Execution

|High| $7,500 | Significant Auth Bypass, Significant Information Disclosure, Privilege Escalation to an Admin user, SSRF etc. |

| Medium| $3,000| Reflected XSS, CSRF, Access Control issues etc.

| Low| $500 | Open Redirection, Information leakage etc.

The final decision is at Instacart’s sole analysis of the impact posed by the submission.

Additional Factors

When determining the reward amount, the following are example factors that are taken in to consideration, and can either raise or lower the amount:

  • Does the vulnerability require privileged access, or is it publicly exploitable?

  • Are all Instacart users affected, or only a subset? Are all devices/browsers vulnerable?

  • Is the vulnerability limited in someway (such as SSRF to only a specific IP range)?

  • How “noisy” would exploitation be? Does it require one HTTP request or 100,000?

Google Play Security Reward Program

Certain vulnerabilities with a working proof of concept on some of our Android mobile app(s) may qualify for an additional bounty through the Google Play Security Rewards Program.

To see which apps and vulnerabilities may qualify for a bounty, please refer to the Google Play Security Rewards Program’s Scope and Vulnerability Criteria (https://www.google.com/about/appsecurity/play-rewards/#rewards).


Submissions

We want to get your submissions resolved and rewarded as soon as possible, but in order to achieve this goal, we need a few things from you first.

Report Quality

You should aim to include all of the relevant information that we need to a) reproduce the issue, and b) understand the impact, in your submission. This can include:

  • A summary of the issue - what could a malicious user do with this bug?

  • POC steps for us to replicate the issue

  • Details of any test accounts or objects you used to aid debugging

We understand that English may not be the first language of many researchers, so including screenshots or a short video demonstrating the issue can help expedite the triage process.

Demonstrating Impact

In order to demonstrate impact for various types of bugs, you can use one of the following techniques, which will avoid you causing a privacy violation by accessing sensitive data/services:

  • For SQL injection, select version() or current_user and include the output. Do not attempt to load data from other rows or tables

  • For command injection, you can run touch /tmp/{your_username} and send us the file path. Do not attempt to modify or cat other files such as /etc/passwd

  • For XSS, you should run alert(document.domain) to prove that the code is running under our origin and not a third-party or sandboxed domain

  • For authentication/authorization issues, you should attempt to load data from one of your other test accounts and not other Instacart users

If at any stage you’re unable to demonstrate impact without potentially accessing production data, you should let us know so that we can do the investigation for you.

Attribution

In order for us to attribute any test traffic or data back to you, we ask that when you create accounts your include your HackerOne username in the email address field.

Additionally, in order to test authentication/authorization issues, you should create multiple test accounts.

Automated Tools

We recognize that using various automated tools is an important part of the recon and testing phases of bug bounty. As such, rather than prohibiting their use, we ask that you configure your tools to use reasonable limits. For example, up to 5 threads for directory brute-forcing is likely to not cause impact and is therefore reasonable, whereas 500+ threads is not.


Transparency

Instacart is committed to being as transparent as possible throughout the whole submission life cycle. We want you to know what to expect when you send in a submission.

As each submission is different, there can be unexpected delays or additional investigation that is required, but these are the typical processes we go through:

Triage Process

When a submission has been validated as potentially valid by HackerOne Triage, a member of the Instacart Bug Bounty team will perform further validation to understand:

  1. Is the submission unique, or a duplicate of another submission or an internal issue?

  2. Does it meet our bar for a security issue?

  3. Do we have enough information for the impact to be understood or for the submission to be triaged internally?

Based on the above, we’ll either ask for more information, close out the issue, or forward it internally for further verification and fix.

We aim to keep you updated throughout the fix process, but there can be additional unseen factors which extend the time taken to get a submission to a resolved state.

Payout Process

As researchers ourselves, we know how frustrating it can be waiting for a payout on a submission. Therefore our aim is to pay out submissions as soon as practically possible after triage. The way we do it is the following:

  • If a submission has clear security impact, and we are confident it isn’t a duplicate, we will pay our minimum bounty at time of triage

  • The team hosts a payout meeting to discuss and vote on all recent submissions

  • For those which are eligible for a reward, we will then either reward the remaining bounty after the meeting (for those already having a minimum bounty issued), or the full bounty (for those without an existing payout)

  • For those which are not eligible, we will articulate to you why this is the case and mark the submission as ineligible

  • For the rare cases where we’re unsure if it’s eligible or not, we will award the bounty at time of resolution - this is so that we can make a more informed decision based on the actions we took

We also recognize that payout amounts can be different than what you’re expecting, therefore we will try to give a justification when issuing the payout - for example, if we found additional impact and are giving a larger reward, or if the submission had less impact that originally thought.

Feedback

Without researchers our program wouldn’t exist, so we welcome any and all feedback as to how we can improve! If you have any thoughts, please feel free to reach out to our team at bug-bounty@instacart.com.

In Scope

Scope Type Scope Name
android_application

com.instacart.client

ios_application

Android & iOS App for Instacart Shoppers

ios_application

545599256

web_application

www.instacart.com

web_application

api.instacart.com

web_application

shoppers.instacart.com

web_application

admin.instacart.com

web_application

*.instacart.com

web_application

*.instacart.tools

web_application

instacart.careers

Out of Scope

Scope Type Scope Name
web_application

news.instacart.com

web_application

brand.instacart.com

web_application

enterprise-status.instacart.com

web_application

tech.instacart.com

web_application

life.instacart.com

web_application

*.email.instacart.com

web_application

design.instacart.com

web_application

covidresponse.instacart.com

web_application

corporate.instacart.com

web_application

carrotstore.instacart.com

web_application

careers.instacart.com


This program leverage 21 scopes, in 3 scopes categories.

FireBounty © 2015-2024

Legal notices | Privacy policy