Program stats

26 vulnerabilities rewarded

2 days average response time

$355.17 average payout (last 12 weeks)

Latest hall of famers

Recently joined this program

400 total

Please note: This is NOT an easy web target (for instance, running scanners is unlikely to help you here, and standard XSS-type injections won't yield much either). That said, 1Password is committed to helping you succeed on this program. To this end, they've setup a researcher vault with additional, helpful information, that requires you opt-in to receive an invite. You can opt-in by emailing julie@agilebits.com with your Bugcrowd username, and you'll be provisioned account access to the vault where 1Password provides supplemental information for testing against the application - including documentation on real issues that were recently found (so as to give direction towards where more issues may be present) and more.

Reward Guidelines

Only capturing the unencrypted "bad poetry" flag is eligible for the $100k reward. See below for more details.

All other findings will be prioritized as per the Bugcrowd Vulnerability Rating Taxonomy.

Priority Reward Amount (*up to)
P1 $5,000
P2 $1,000
P3 $200
P4 $100

Targets

Out of scope

All other subdomains, except your account-specific (Business or Family) subdomain and the white box testing team subdomain listed above, are out of scope.

Credentials:

There are two ways you can authenticate to the application:

  • via the Bugcrowd test team (you must request an invite by sending a request to julie@agilebits.com) [note that this is the only area where you can access information regarding the 'bad poetry' flag and internal api documentation, etc]
  • via your own team account (this can be created by registering your own account [you MUST use your username@bugcrowdninja.com email address])

When submitting, please be sure to include email credentials and all recent IPs.

Note: Server-side APIs are the focus area for this program. Please contact support+bugcrowd@1password.com for assistance in getting your guest membership in "bugcrowd-test" approved as quickly as possible. White box testing materials are available through that team. Additionally, this program may require use of a Mac OS X or iOS device for some tasks where full Android and Window support is not yet available.

Focus Areas:

  • Teams website
    • Static marketing web pages under teams.1password.com
  • Team (Business and Family) signup process
    • Team owner
    • Team members
    • Including guest members
  • Sign in / authentication
  • Teams web application
    • Vaults must be created through the Teams web application
    • All vault and user management must be performed through the Teams web application.
    • Admin Console
    • Vault creation and sharing
    • Team member invitation and approval
      • Assign new team members to vaults
    • Owners, admins and recovery
    • Guest user invitation and removal
    • User removal
    • Account recovery
    • Selected vault view
    • View vault items as ordinary user
      • See Native apps section
    • Repeat as Admin user
      • May be able to see more vaults
      • Cannot see other users' personal vaults
    • Repeat as Guest user
      • Should only have access to specific vaults
      • No personal vault
      • Restricted permissions
    • Repeat as suspended user
      • Cached data may be available for some period of time
      • No new back-end server requests should be honored
  • Native apps (Android 5.0+, iOS, OS X, Windows)
    • Item creation through native applications
    • Item deletion through native applications
    • Item updates through native applications
    • Item sharing / copying through the native applications

General Exclusions:

  • Headers used to maintain session state (Session ID)
  • Scheduled infrastructure changes
  • DDoS/DoS attacks
    • Enumeration attacks require prior notification and approval

Excluded bugs for Android, iOS, Windows, and macOS apps

  • Any bugs which do not compromise account, user, vault or item security
  • Any bugs which require use of a debugger or hardware tools to recreate

Excluded bugs for Other operating systems

  • Any bugs which do not compromise account, user, vault or item security
  • Any bugs which require use of a debugger or hardware tools to recreate
  • Any bugs caused by operating system virtualization or emulation

1Password wants to help you!

If you have something that you feel is close to exploitation, or if you'd like some information regarding the internal API, or generally have any questions regarding the app that would help in your efforts, please create a submission and ask for that information.

Furthermore, 1Password wishes to facilitate a white-box testing environment as best they can - to this end, if you have any questions regarding the workings of the application, or requests for information on the API, you're encouraged to email them at julie@agilebits.com.

1Password will also accept flaw-hypothesis submissions, without penalty, and will work with you to develop a reasonable hypothesis into a working exploit, should one be possible.


Product Notes:

1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.

With 1Password for Teams, you have full control over who has access to your most important information. It's never been so easy to share the simple security of 1Password with everyone. Additional information can be found here.

This program focuses on teams signups and basic infrastructure, and has expanded to cover all of the server-side APIs. It is our intention that this program include White Box Testing features, allowing researchers to cut to the chase and attack the product more directly, with API documentation provided on a best-effort basis.

1Password has included REST API documentation, including the URI, method and parameters for a number of interfaces. Additional APIs may be requested, on a best-effort basis.

The guest vault includes information needed to attempt to "Capture The Bad Poetry" as well as an item which is set to be read-only so that researchers may attempt an unauthorized item modification. See the "Researchers" vault for more details.

Two account types -- Business and Family -- are included in the program. As a member of the bugcrowd-test Business account, you will be testing the product as an unprivileged member of the bugcrowd-test account. If you wish to test the product as a privileged account member, you may also sign up for your own Business or Family account. All initial signups receive a free trial period that is at least 30 days long. Please be sure to sign up using your bugcrowdninja.com domain email address so we can track your account as part of the program. Additionally, AgileBits may, at its sole discretion, extend your account as you continue to make submissions as part of the program. Please contact julie@agilebits.com to extend your free account as you continue to make submissions in this program. Happy Bug Hunting!!!

Other Notes

Rate limiting - There is rate limiting present on the application, so be careful in running scanners or anything that might send an excessive number of requests and add additional waiting to your testing. For this program we request that you submit flaw hypotheses for any enumeration vulnerabilities you believe you have found.

Design decisions- while we are always willing to entertain discussions about design decisions, please understand that the design has been extensively reviewed by our internal team as well as external reviewers.

Rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for Informational (P5) findings. Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.