Dell Technologies Application Bug Bounty

  • $50 – $2,500 per vulnerability

Dell - Discontinue use of scanners and High Volume Requests

We have been asked by Dell to discontinue the use of all automated vulnerability scanners on their program.

Custom scripts and fuzzing tools are still permitted, but if using them, please keep your traffic to six requests per second or less. Additionally, it’s worth noting that the client already runs automated scans from Acunetix, Zap, Nessus, et al., against the in-scope targets – so using these tools is likely of minimal utility to researchers.

As such, please avoid using them unless for targeted, specific testing, and then only at less than six requests per second. Thanks!

If you have any questions, please reach out to for any clarification on why scanners are no longer allowed.