To qualify for a bounty, report a security bug in one of the following qualifying products or components:
Snyk website (dedicated host for the program is: https://beemo.snyk.io)
Snyk Command Line Interface (CLI) npm package https://github.com/Snyk/snyk
Snyk Broker component https://github.com/Snyk/broker
Out of scope
Spam or social engineering techniques.
Security issues in third-party apps or websites that integrate with Snyk. These are not managed by Snyk and do not qualify under our guidelines for security testing.
We recognize and reward security researchers who help us keep people safe by reporting vulnerabilities in our services. Monetary bounties for such reports are entirely at Snyk’s discretion, based on risk, impact, and other factors. To potentially qualify for a bounty, you first need to meet the following requirements:
Adhere to our Responsible Disclosure Policy (see above).
Report a security bug: that is, identify a vulnerability in our services or infrastructure which creates a security or privacy risk. (Note that Snyk ultimately determines the risk of an issue and that many software bugs are not security issues).
We specifically exclude certain types of potential security issues; these are listed under “Ineligible Reports and False Positives” (see below).
Submit your report to email@example.com (one issue per report) and respond to the report with any updates. Please do not contact employees directly or through other channels about a report.
If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating an issue, be sure to disclose this in your report.
Use test accounts and the dedicated bug bounty server (beemo.snyk.io) when investigating issues.
In turn, we will follow these guidelines when evaluating reports under our bug bounty program:
We investigate and respond to all valid reports. Due to the volume of reports we receive, though, we prioritize evaluations based on risk and other factors, and it may take some time before you receive a reply.
We determine bounty amounts based on a variety of factors, including (but not limited to) impact, ease of exploitation, and quality of the report. If we pay a bounty, the minimum reward is $20 USD. Note that extremely low-risk issues may not qualify for a bounty at all.
We seek to pay similar amounts for similar issues, but bounty amounts and qualifying issues may change with time. Past rewards do not necessarily guarantee similar results in the future.
In the event of duplicate reports, we award a bounty to the first person to submit an issue. (Snyk determines duplicates and may not share details on the other reports.) A given bounty is only paid to one individual.
You may donate a bounty to a recognised charity (subject to approval by Snyk), and we double bounty amounts that are donated in this way.
We reserve the right to publish reports (and accompanying updates).
We verify that all bounty awards are permitted by applicable laws, including (but not limited to) US trade sanctions and economic restrictions.
Your use of Snyk services, including for purposes of this program, is subject to Snyk’s Terms and Policies. We may retain any communications about security issues you report for as long as we deem necessary for program purposes, and we may cancel or modify this program at any time.