Our disclosure process is open source 🎉

We reward for every valid disclosure you make.
 Contributing with GitHub

Our bounty database is now open source! To disclose a vulnerability, open a pull request against our vulnerability database and get rewarded!

All of your disclosures will improve your GitHub contributions graph, so you get the best of both worlds. Open source contributions and some extra dollar!

Get started


We pay $25 for every disclosure where:

The package is in a registry (apart from Maven) and has over 1000 downloads per month
The CVSS score is at least 3.0
A fix is not already available
The source repo has had activity in the last year
A proof of concept (PoC) exists and is included

If the CVSS is more than 8.0 and is a well maintained package, but isn't on a registry, we may award the bounty at our discretion.
Our payments for disclosures are made on the 25th of each month. Make sure your PayPal address is up-to-date in your settings.

We don't accept:

Vulnerabilities that are only client side (e.g. type a payload into the console and it runs locally)
Physical or social engineering attacks
Vulnerable dependencies of a package
Rate limiting issues that do not have a clear impact
Injection vulnerabilities that only let you modify text (we will weigh up the context on this)
Improper password complexity restrictions
Vulnerabilities that don't have a clear security impact (e.g. CSRF but it only logs out a user)

If you have any questions, get in touch at security@huntr.dev.

Disclose your findings