READ THIS FIRST:
Configure your scanners:
- ALL TARGETS: Include "bugcrowd" in the user-agent string
- CORPORATE WEBSITE: Populate email fields with your @bugcrowdninja.com address (for more info regarding @bugcrowdninja email addresses, see here: https://researcherdocs.bugcrowd.com/v2.0/docs/your-bugcrowdninja-email-address)
Scope is limited - READ THE BRIEF BEFORE TESTING
UPDATE: All valid subdomain takeovers will be rewarded with a $100 maximum as of March 23rd, 2021.
For this program, we are inviting researchers to test our community and customer facing web resources, as well as our Privilege Service. For high level product information, see: https://www.centrify.com/privileged-access-management/
This program adheres to the Bugcrowd Vulnerability Rating Taxonomy for the prioritization/rating of findings.
Scope and rewards
This program follows Bugcrowd’s standard disclosure terms.
For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email firstname.lastname@example.org. We will address your issue as soon as possible.
This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.