Unless explicitly stated, the following issues are not eligible for rewards unless they lead to serious data leaks or security impact with a working Proof-of-Concept (PoC).
- CSRF on unauthenticated forms or forms with no sensitive actions
- Account enumeration (via login, registration, or password reset)
- Session timeout or lack of automatic logout
- Session hijacking via cookie reuse (without method to obtain the cookie)
- Autocomplete enabled on login fields
- Weak password policy (unless combined with brute-force or no rate-limiting)
- Missing email verification (unless it leads to abuse or escalation)
- Self-XSS (requires user interaction in their own browser)
- Lack of account lockout after multiple failed login attempts
- Click-jacking
- Open redirect without clear impact (e.g., no credential theft or token leakage)
- Missing or misconfigured HTTP headers (e.g., X-Frame-Options, X-Content-Type-Options)
- Missing
HttpOnly,Secure, orSameSitecookie flags - Missing Content Security Policy (CSP) header (unless exploitable)
- CORS misconfiguration without sensitive data exposure
- Host header injection without demonstrable impact
- Error messages or stack traces without sensitive data
- Directory listing without exposing sensitive files
- Misconfigured
robots.txtfile
- SSL/TLS best practices (e.g., use of TLS 1.0 or weak ciphers)
- Disclosure of server software versions (Apache, Nginx, PHP, etc.)
- Exposure of internal IPs or non-sensitive infrastructure information
- DKIM, SPF, or DMARC configuration issues
- DNS misconfigurations without takeover (e.g., dangling CNAME)
- Subdomain takeover on inactive subdomains without business impact
- Denial of Service (DoS) or brute-force attempts
- Lack of rate limiting (without actual abuse or bypass)
- Use of automated tools or scanners to generate large volumes of traffic
- Downloading of public videos or other static resources
- Abuse of confirmation/resend email functionality
- Hypothetical flaws or suggestions without an exploitable Proof-of-Concept
- Use of outdated or vulnerable libraries (unless exploitable)
- Exposure of public-facing JavaScript source code
- Disclosure of technology stacks or frameworks (e.g., React, jQuery, WordPress)
- Cached information in search engines or the Wayback Machine
- Physical attacks against offices or data centers
- Social engineering of employees, service desk, or contractors
- Compromise of user accounts not due to platform vulnerabilities