skip to Main Content



Outlines the rules of engagement for a bounty program. This includes a clearly defined testing parameter to inform researchers what they can and cannot test, as well as the payout range for accepted vulnerabilities.

Learn More About The Most Critical Vulnerabilities of 2019Download Report
Back To Top