BIGO Bug Bounty Program Policy
BIGO Bug Bounty Program Policy
By participating in the program, you agree that you are bound by and
subject to this policy. We may modify the terms of this policy or terminate
us, our affiliates, or our business partners (or any of our or their users,
employees, or contractors, we, in our sole discretion, may remove you from
the program and disqualify you from receiving any reward under the
program).
In this Policy, unless otherwise provided in this Policy, the following term
Response Targets
Processing stage
day
Time to triage (from successful report submission): 3 business day
Depending on the complexity of the report and our current report flow, we
may take longer to respond. We’ll try to keep you informed about our
detailed enough to reproduce the issue, the issue will not be eligible for a
reward.
If more than one person reports the same security vulnerability, the
reward will generally be given to the first person to successfully submit the
one bounty.
issue.
Core business
Hello Yo
Imo
Bigo Live
Likee
Before receiving the express written authorization from our company, please do
not publicly disclose or provide any detailed information about the safety
vulnerabilities. Rewards are usually paid in the following month. Whitehat shall
issue a legal and valid invoice before BIGO makes the payment. The bank transfer
fees which is chargeable as per the Bank’s process and guidelines shall be borne
by BIGO. The following table outlines the nominal rewards for specific categories
of vulnerabilities for the attributes in the scope (see the "Scope" section).
The amount paid by BIGO to the whitehat under this Policy shall be inclusive of
all applicable taxes, including but not limited to income tax, value added tax, wit
hholding tax, sales tax or any other related taxes imposed by authorities in the T
erritory.
The whitehat shall be responsible for declaration and payment of all applicable t
Rewards in USD
business type
【Critical】
3. Vulnerabilites that permit sending messages to other users via spoofed BIGO id,
【High】
1. Affect a certain range of user account or fund security, including but not limited to:
non-core DBSQL injection, storage type XSS that can cause automatic propagation,
CSRF involving transactions, funds, and passwords, which can lead to user account
reversible or plaintext, mobile API access summary, hard coding and other issues
3. A wide range of other defenses that affect users. Including but not limited to
storage type XSS (including storage type DOM-XSS) of important pages that can
cause automatic transmission and CSRF involving transactions, funds, and passwords.
【Medium】
1. Vulnerabilities that require interaction to affect users. Including but not limited to
storage XSS for general pages, including but not limited to storage XSS for general
pages, JSONP hijacking of sensitive information, and CSRF for important operations.
2. Ordinary unauthorized operations include, but are not limited to, incorrect direct
object references, broadcast message forgery that affects business operations, and
3. Common information leakage Including but not limited to client plaintext storage
password, client password plaintext transmission, web path traversal, system path
traversal.
4. Remote denial of service vulnerabilities include, but are not limited to, remote
denial of service on the client side (parse file format, network protocol crashes),
6. OAuth login or binding hijacking that needs to click on the link to interact.
【Low】
1. Vulnerabilities that can be executed only in specific browsers (such as lower than IE
11) or client environments and have less impact, including but not limited to reflective
2. It is difficult to use but there may be safety hazards. Including but not limited to
Self-XSS that may cause dissemination and exploitation, CSRF for non-critical
sensitive operations, SMS bombs, brute force cracking without guessing user
3. Low-sensitivity information leakage includes, but is not limited to, path leakage,
non-core code SVN file leakage, non-sensitive system source code and passwords
【No impact】
1. Network security bugs, including but not limited to garbled webpages, webpages
reports that have no practical significance (such as the low version of Web Server,
Domain name leakage, 401 basic authentication phishing, program path trust
issues, and logcat information leakage without sensitive information. The use of
3. Without any precautions. Including, but not limited to, your account is stolen, it
means there is a loophole.
threat intelligence. Rewards are usually paid in the following month. Whitehats
shall issue a legal and valid invoice before BIGO makes the payment. The bank
transfer fees which is chargeable as per the Bank’s process and guidelines shall
be borne by BIGO. The following table outlines the nominal rewards for specific
categories of threat intelligence for the attributes in the scope (see the "Scope"
section).
Rewards in USD
Threat intelligence scoring is given by BIGO SRC with comprehensive factors such
as business level, actual impact and intelligence clues integrity. According to the
degree of intelligence hazard, the intelligence level is divided into five levels:
【Critical】
1. The core business server was invaded and related behavior characteristics were
2. The core business database is dragged and provided with clues such as the
【High】
3. New viruses, Trojan horses, and worms that can cause major impacts. Such as
businesses.
【Medium】
1. New available tools and methods. Such as: tools that can scan account numbers
by bypassing the strategy; (tools need to provide attack principles and repair
2. Medium risk business security issues, such as cheating activities and bypassing
business rules;
3. The basic information of the threat organization, including but not limited to the
threat organization related personnel, structure, scale, region, activities and other
information, communication and sales channels, tools and platforms used, related
【Low】
etc.;
【No impact】
information, etc.
The following issues are outside the scope of our vulnerability rewards program
Forms missing CSRF tokens (we require evidence of actual CSRF vulnerability)
Logout CSRF
Password and account recovery policies, such as reset link expiration or password
complexity
platforms
Issues that result in Denial of Service (DoS) to BIGO's servers at the network or
application layer.
If you believe your account has been compromised, please contact BIGO support
directly.
The decision to grant a monetary rewarded and the final amount for a vulnerability
To the extent your security research activities are inconsistent with certain
restrictions in our relevant site policies but are consistent with the terms of our
bug bounty program, we may waive those restrictions for the sole and limited
purpose of permitting good faith security research under this bug bounty program.
products, or services of a third party, including any BIGO users, we cannot bind
that third party, and they may pursue legal action or law enforcement notice. We
cannot, and do not, authorize security research in the name of other entities or
individuals, and cannot in any way offer to defend, indemnify, or otherwise protect
You must, as always, comply with all laws applicable to you, and not to disrupt or
compromise any data beyond what our bug bounty program permits.