Our disclosure process is open source 🎉
We reward for every valid disclosure you make.
Contributing with GitHub
Our bounty database is now open source! To disclose a vulnerability,
open a pull request against our
and get rewarded!
All of your disclosures will improve your GitHub contributions graph, so you get the best of both worlds. Open source contributions and some extra dollar!
We pay $25 for every disclosure where:
The package is in a registry (apart from Maven) and has over
1000 downloads per month
The CVSS score is at least 3.0
A fix is not already available
The source repo has had activity in the last year
A proof of concept (PoC) exists and is included
If the CVSS is more than 8.0 and is a well maintained package, but
isn't on a registry, we may award the bounty at our discretion.
Our payments for disclosures are made on the 25th of each month. Make sure your PayPal address is up-to-date in your settings.
We don't accept:
Vulnerabilities that are only client side (e.g. type a payload
into the console and it runs locally)
Physical or social engineering attacks
Vulnerable dependencies of a package
Rate limiting issues that do not have a clear impact
Injection vulnerabilities that only let you modify text (we will weigh up the context on this)
Improper password complexity restrictions
Vulnerabilities that don't have a clear security impact (e.g. CSRF but it only logs out a user)
If you have any questions, get in touch at email@example.com.Disclose your findings