🐛Security Research

VibeGuard Bug Bounty Program

Help us keep VibeGuard secure. We welcome responsible security researchers to identify vulnerabilities and earn rewards for valid findings that improve our platform's security.

$50k
Max Bounty
24h
Response Time
100+
Researchers

Program Overview

Our bug bounty program rewards security researchers for finding and responsibly disclosing vulnerabilities in VibeGuard's systems and applications.

💰

Rewards up to $10,000

Competitive bounties based on vulnerability severity and impact. Critical findings can earn up to $10,000 in rewards.

🤝

Responsible Disclosure

We work closely with researchers following responsible disclosure practices. Your findings help improve security for everyone.

🏆

Recognition & Credits

Get public recognition on our security hall of fame and in our quarterly security reports (with your permission).

Bounty Structure

Rewards are determined by severity, impact, and exploitability of the vulnerability

SeverityDescriptionBounty RangeExamples
CriticalRemote code execution, complete system compromise, or unauthorized access to sensitive customer data$5,000 - $10,000RCE, SQL injection, Authentication bypass
HighSignificant security impact with potential for data breach or service disruption$1,000 - $5,000XSS with admin impact, Privilege escalation
MediumModerate security impact that could lead to information disclosure or service degradation$250 - $1,000CSRF, Information disclosure, DoS
LowMinor security issues with limited impact or exploitability$50 - $250Information leakage, Rate limiting bypass

Program Scope

What's included and excluded in our bug bounty program

✅ In Scope

Web Applications

  • • https://app.vibeguard.com
  • • https://vibeguard.com
  • • https://api.vibeguard.com
  • • https://docs.vibeguard.com

Mobile Applications

  • • VibeGuard iOS app
  • • VibeGuard Android app

APIs & Integrations

  • • REST APIs
  • • GraphQL endpoints
  • • Webhook handlers
  • • OAuth implementations

❌ Out of Scope

Infrastructure

  • • Load balancers and CDN
  • • Third-party services
  • • Physical security
  • • Social engineering attacks

Non-Security Issues

  • • Business logic flaws
  • • UI/UX issues
  • • Performance issues
  • • Feature requests

Low Impact Issues

  • • Missing security headers (unless exploitable)
  • • Self-XSS without impact
  • • Clickjacking on non-sensitive pages
  • • Outdated software versions without exploits

Rules & Guidelines

Please follow these guidelines to ensure a smooth and productive research process

🎯Research Guidelines

  • Test only on your own accounts and data
  • Do not access or modify other users' data
  • Avoid automated scanning that could impact service
  • Do not perform denial of service attacks
  • Report findings through our secure disclosure process
  • Provide detailed reproduction steps
  • Allow reasonable time for remediation before disclosure
  • Act in good faith and respect our users' privacy

📝Submission Requirements

Required Information

  • • Detailed vulnerability description
  • • Step-by-step reproduction instructions
  • • Proof of concept (screenshots, videos, code)
  • • Impact assessment and potential exploits
  • • Affected URLs, parameters, or endpoints

Submission Process

  • • Email: [email protected]
  • • Use PGP encryption for sensitive reports
  • • Include "Bug Bounty" in the subject line
  • • Expect acknowledgment within 24 hours
  • • Regular updates every 5 business days

Security Hall of Fame

Recognizing security researchers who have helped improve VibeGuard's security

🥇

Alex Chen

Critical SQLi vulnerability

$8,500 bounty
🥈

Maria Rodriguez

Authentication bypass

$4,200 bounty
🥉

James Wilson

XSS with data access

$2,800 bounty
🏆

Sarah Kim

API privilege escalation

$1,500 bounty

Ready to Report a Vulnerability?

Help us improve VibeGuard's security and earn rewards for your responsible disclosure

[email protected] • PGP Key Available • Response within 24 hours