Responsible Disclosure
Even though we design our systems from a security first perspective, and use third party code reviews to review our systems for vulnerabilities, it is always possible we missed something. If you discover a bug or potential security risk, please let us know! You can reach us at [email protected]. The following guidelines apply.
Rules
- Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
- Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
- When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).
- Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
- Social engineering (e.g. phishing, vishing, smishing) is prohibited.
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
- Only interact with accounts you own or with explicit permission of the account holder.
Scope
Our responsible disclosure program covers all our products and services under our direct control. Some of the websites that are reachable under Bitvavo domains are not under our direct control. These are not eligible for rewards:
Examples of issues that are eligible for rewards:
Vulnerability | Severity Range |
---|
Remote Code Execution | Critical |
SQL Injection | Medium - High |
XXE | Medium - High |
XSS | Low - High |
Server-Side Request Forgery | High - Critical |
Authentication/Authorization Bypass (Broken Access Control) | Low - Critical |
Privilege Escalation | Low - Critical |
Security Misconfiguration | Low - Medium |
Vulnerabilities not in the above list will be evaluated case by case.
Out of Scope Vulnerabilities
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
- Brute force exploits.
- Clickjacking of any kind. It is improperly configured in our test site, but our main domain has a
X-Frame-Options
header set. - Missing security cookie attributes (
secure
, httponly
, and samesite
). - Forms missing CSRF tokens (we require evidence of actual CSRF vulnerability).
- Attacks requiring MITM or physical access to a user's device.
- Previously known vulnerable libraries without a working Proof of Concept.
- Missing best practices in SSL/TLS configuration.
- Any activity that could lead to the disruption of our service (DoS).
- Absence of rate limiting.
- Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS.
- Issues without clearly identified security impact, such as clickjacking on a static website, missing security headers, or descriptive error messages.
- User enumeration of any kind (email ownership and timing attack).
- Improper error handling unless proved in production environment.
- Sender Policy Framework(SPF) or DomainKeys Identified Mail(DKIM) related findings.
- Open redirection at
/redirect
endpoint with redirect
parameter and at /apps/affiliate/v1/generate-url
endpoint with merchant_fallback_url
parameter. - (mobile) Local access to user data when operating a rooted mobile device.
- (mobile) Attacks that require physical access to or modification of the mobile device are not in scope.
Vulnerability guidelines
Critical
Severity level includes but is not limited to:
- Vulnerabilities that can compromise the confidentiality, integrity, or availability of production and corporate resources and/or data with limited exploitation difficulty and/or attacker skill.
- Vulnerabilities that could be easily exploited by a remote or unauthenticated attacker and lead to system compromise and/or exposure of highly sensitive or customer data of any kind without requiring user interaction.
High
Severity level includes but is not limited to:
- Vulnerabilities that can compromise the confidentiality, integrity, or availability of production and corporate resources and data.
- Vulnerabilities that could be easily exploited by an internal and/or external, authenticated/unauthenticated attacker and lead to system compromise and/or exposure of highly sensitive or customer data without requiring user interaction.
- Vulnerabilities that allow local users to gain increased privileges.
- Vulnerabilities that allow unauthenticated remote users to view sensitive information.
Medium
Severity level includes but is not limited to:
- Vulnerabilities that may be more difficult to exploit but could still lead to some compromise of the confidentiality, integrity, or availability of resources, under certain circumstances.
- Vulnerabilities that could have had a critical or high impact but are less easily exploited based on a technical evaluation of the flaw, or affect unlikely configurations.
Low
Severity level includes but is not limited to:
- Vulnerabilities that may be more difficult to exploit but could lead to minimal compromise of the confidentiality, integrity, or availability of resources under unlikely circumstances.
- These types of vulnerabilities require unlikely circumstances to be able to be exploited, or where a successful exploit would have minimal consequences.
Reward
Rewards are paid in bitcoin or euro. The minimum reward for bugs is 100 EUR. For more serious issues, the bounty is (significantly) higher. These bounties are at our discretion.
How to Report an Issue
Please send an e-mail to [email protected] with a proof of concept explaining the issue(s) you found.