Humble Bundle

  • Points & Charity per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

81 vulnerabilities rewarded

Validation within about 24 hours
75% of submissions are accepted or rejected within about 24 hours

Latest hall of famers

Recently joined this program

1160 total


Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

Security is extremely important to us at Humble Bundle. In addition to doing our best to make a secure product, we are opening up a streamlined process for the community to responsibly report any sort of security issues to us. We will be monitoring this very closely and sincerely thank anyone who helps us maintain our high security standards.

Please note that this page is intended for security researchers or other people who have found a technical bug in our website. If you are a customer who has a personal security issue such as your account being compromised or a question about billing, please contact our customer service team at as soon as possible, instead of using this bug report form!

Researchers will receive Kudos points for all valid submissions, and the ability to donate up to $100 to the charity of their choice by leaving a comment in the submission.

This program only awards points for VRT based submissions.


In scope

Target name Type Tags Other
  • Moment.js
  • jQuery
  • Select2
  • Lodash
  • Backbone
  • Algolia

Please read and follow the rules in the Standard Disclosure Terms.

The following finding types are specifically excluded from the bounty:

  • Descriptive error messages (e.g. Stack Traces, application or server errors).
  • Login Page / Forgot Password Page Account Brute force or account lockout not enforced.
  • HTTP 404 codes/pages or other HTTP non-200 codes/pages.
  • Banner disclosure on common/public services.
  • Disclosure of known public files or directories, (e.g. robots.txt).
  • Clickjacking and issues only exploitable through clickjacking.
  • Self-XSS and issues exploitable only through Self-XSS.
  • CSRF on forms that are available to anonymous users (e.g. the contact form).
  • Logout Cross-Site Request Forgery (logout CSRF).
  • Presence of application or web browser "autocomplete" or "save password".

Program rules

This program follows Bugcrowd’s standard disclosure terms.

Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.