Program stats

118 vulnerabilities rewarded

Validation within 3 days
75% of submissions are accepted or rejected within 3 days

Latest hall of famers

Recently joined this program

334 total

Fitbit's mission is to empower people to lead healthier, more active lives by providing them with data, inspiration and guidance to reach their goals. To achieve this mission, we must earn and maintain the trust of our users that we will protect the privacy and security of their data.

We see the community as a key partner in our efforts to ensure our systems and users' data remain safe. We're grateful for all information responsibly disclosed to us.

Focus Areas

  • Web
    • Dashboard and User Settings
    • Store
    • Corporate Wellness
  • API
  • Sync Clients on Mac, Windows, iOS, Android

(Please note that any Denial of Service attacks are not welcome on this bounty; related submissions will be marked Out of Scope)


Prohibited testing:

The following types of attacks are not authorized with this bounty program:

  • Any type of denial of service attack
  • High volume automated submission of contact forms (please don't do it)
  • Social engineering and Phishing
  • Physical access to infrastructure
  • Automated scans

This program does not require a Fitbit device to participate.

  • Signup for a Fitbit account at

Download Fitbit apps

  • iOS -
  • Android -

Download Fitbit client application:

  • Mac OS -
  • Windows < 10 -
  • Windows 10+/Windows Phone -

API Information and Documentation:


Out of Scope Resources

Resources are out of scope unless specifically listed above. In particular, please note that,, are notable examples of resources not in scope.

Please note, we do not provide logins for our corporate wellness programs ( for bug bounty participants, however we are interested to hear about unauthenticated issues within the site.

Please read and follow the rules in the Standard Disclosure Terms.

Note: This program is considered a 1st identification only, no pivoting bounty. If you find a critical issue and wish to prove the threat scenario please use the comment system and describe it thoroughly. Do not go past the 1st identified vulnerability in testing. Do not exfiltrate any internal data.

The following finding types are specifically excluded from the bounty:

  • Descriptive error messages (e.g. Stack Traces, application or server errors).
  • HTTP 404 codes/pages or other HTTP non-200 codes/pages.
  • Fingerprinting / banner disclosure on common/public services.
  • Disclosure of known public files or directories, (e.g. robots.txt).
  • Clickjacking and issues only exploitable through clickjacking.
  • CSRF on forms that are available to anonymous users (e.g. the contact form).
  • Logout Cross-Site Request Forgery (logout CSRF).
  • Self-XSS and issues exploitable only through Self-XSS.
  • Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
  • Lack of Secure/HTTPOnly flags on non-sensitive Cookies.
  • Lack of Security Speedbump when leaving the site.
  • Weak Captcha / Captcha Bypass
  • Login or Forgot Password page brute force and account lockout not enforced.
  • Bug reports speculating on rate limiting behavior (or absence thereof) if you were to submit a huge number of requests. (Note that Standard Bugcrowd Terms already exclude actually DoS’ing.)
  • OPTIONS HTTP method enabled
  • HTTPS Mixed Content Scripts
  • Username / email enumeration
    • via Login Page error message
    • via Forgot Password error message
  • Missing HTTP security headers, specifically (, e.g.
    • Strict-Transport-Security
    • X-Frame-Options
    • X-XSS-Protection
    • X-Content-Type-Options
    • Content-Security-Policy, X-Content-Security-Policy, X-WebKit-CSP
    • Content-Security-Policy-Report-Only
  • The following SSL Issues:
    • SSL Attacks such as BEAST, BREACH, Renegotiation attack
    • SSL Forward secrecy not enabled
    • SSL weak / insecure cipher suites
  • Note: While non exploitable SSL vulnerabilities are out of scope, remotely exploitable SSL bugs on the binaries or the website will be considered.
  • Reports pertaining to DKIM, SPF, and related email anti-spam technology

Out of Scope bugs for Android apps

  • Shared links leaked through the system clipboard.
  • Any URIs leaked because a malicious app has permission to view URIs opened
  • Absence of certificate pinning
  • Sensitive data in URLs/request bodies when protected by TLS
  • User data stored unencrypted on external storage
  • Lack of obfuscation is out of scope
  • oauth "app secret" hard-coded/recoverable in apk
  • Crashes due to malformed Intents sent to exported Activity/Service/BroadcastReceive (exploiting these for sensitive data leakage is commonly in scope)
  • Any kind of sensitive data stored in app private directory
  • Lack of binary protection control in android app

Out of Scope bugs for iOS apps

  • Lack of Exploit mitigations ie PIE, ARC, or Stack Canaries
  • Absence of certificate pinning
  • Path disclosure in the binary
  • User data stored unencrypted on the file system
  • Lack of obfuscation is out of scope
  • Lack of jailbreak detection is out of scope
  • oauth "app secret" hard-coded/recoverable in apk
  • Crashes due to malformed URL Schemes
  • Lack of binary protection (anti-debugging) controls
  • Snapshot/Pasteboard leakage
  • Runtime hacking exploits (exploits only possible in a jailbroken environment)

Out of Scope for Mac/Windows apps

  • Local attacks that require an attacker to already have root/Administrator privilege on the “victim” system
  • Local attacks which only work when security misconfigurations are introduced on the “victim” system (example: systems where users have made c:\ world-writable).
  • Privilege escalations in which the attacker is assumed to already have code execution in the victim's account, and where the escalation requires socially engineering the victim to elevate privileges e.g. through UAC.


This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for Informational (P5) findings. Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.