Open Bug Bounty - How It Works
Open Bug Bounty - How It Works
Open Bug Bounty allows any verified website owners to run a bug bounty for their websites at no cost. The
purpose of this non-profit activity is to make relations between website owners and security researchers
sustainable and mutually beneficial in a long-term prospective.
Starting a bug bounty is free and open to everyone. Once logged in via Twitter, you can create your bug bounty
program in a few minutes and get unlimited access to our security researchers. Once a vulnerability is reported,
you will get instant notification to coordinate disclosure and remediation with researcher.
Open Bug Bounty does triage and verification of the submissions. However, we never intervene to the further
process of your communication with the researchers, vulnerability remediation and disclosure. Once a
vulnerability is verified and reported to you, our role in coordinated disclosure process is over.
For website owners, we provide vulnerability data export option to the following SDLC,
DevOps and bug tracking systems:
About Open Bug Bounty
At this and at any later stages, we never act as an intermediary between website
owners and security researchers.
Coordinated and Responsible Disclosure, ISO 29147
Open Bug Bounty platform follows ISO 29147 standard's (“Information technology -- Security techniques
-- Vulnerability disclosure”) guidelines of ethical and coordinated disclosure. As per the standard, Open
Bug Bounty pursues the following goals of vulnerability disclosure:
As a global vulnerability disclosure Coordinator, Open Bug Bounty also serves the following non-profit
roles as suggested by ISO 29147 in the vulnerability disclosure process:
act as a trusted liaison between the involved parties (researchers and website owners);
coordinate responsible disclosure;
enable communication between the involved parties;
provide a forum where experts from different organizations can collaborate.
Risk level of the submitted vulnerabilities is scored using Common Vulnerability Scoring System (CVSS).
Submitted vulnerabilities are classified by Common Weakness Enumeration (CWE).
Project History
Started in 2014
Safe and Non-Intrusive Testing
We only accept Cross-Site Scripting, CSRF and some other vulnerabilities that
figure among the most common web application vulnerabilities today.
When reporting GDPR PII exposure, we do not store the PII but the blurred
screenshot after verifying the vulnerability.
The proper process of testing for these vulnerabilities is harmless and cannot
damage a website, database, server or related infrastructure. We do not
accept vulnerabilities that can, or are intended to, harm a website, its data or
related infrastructure.
On the platform, researchers get various honorary badges for quality of their
submissions and the number of websites they helped to secure. We always
encourage quality, not quantity of submissions.
Good Faith and Ethics
If a researcher violates the enacted standards of ethics and good faith (e.g.
demands something to delete a submission or refuses to share vulnerability details
with the website owner), such submissions will be immediately deleted.
Researchers who violate the aforementioned rules and ethical guidelines may get
suspended from the platform, up to a permanent ban. If you believe that a
researcher violates the rules, please first talk to the researcher and try to resolve a
possible misunderstanding. If the issue remains unresolved, please contact us.
Privacy and Security
We do not store, process or export any Personally Identifiable Information (PII) as defined
in General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679).
To avoid storing any user-related data, we use external authentication via Twitter for
everyone on the website. Connection to the website is available via HTTPS only.
Open Bug Bounty does not transfer any vulnerabilities, or vulnerability-related data, to
any third-parties. For privacy reasons, we also keep no logs of any activities of website
owners or security researchers.
Terms and Conditions
Open Bug Bounty reserves the right to reject any Open Bug Bounty Program for any
reason in its sole discretion.
Open Bug Bounty may terminate any Researcher's or Website Owner's access to
and use of the Open Bug Bounty Platform, at Open Bug Bounty's sole discretion, at
any time and without notice to the Researcher or Website Owner.
The site may contain links to third-party websites or resources. Open Bug Bounty
provides these links only as a convenience and is not responsible for the content,
products or services on or available from those websites or resources or links
displayed on such websites. Researcher or Website Owner acknowledges sole
responsibility for and assumes all risk arising from Researcher's or Website Owner's
use of any third-party websites or resources.
They Thank Our Researchers
Open Bug Bounty Programs
www.openbugbounty.org