• $100 – $5,000 per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

224 vulnerabilities rewarded

Validation within 25 days
75% of submissions are accepted or rejected within 25 days

$665 average payout (last 3 months)

Latest hall of famers

Recently joined this program

765 total


Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

We appreciate all security concerns brought forth and are constantly striving to keep on top of the latest threats. Being pro-active rather than re-active to emerging security issues is a fundamental belief at Intercom. Every day new security issues and attack vectors are created. Intercom strives to keep abreast on the latest state-of-the-art security developments by working with security researchers and companies. We appreciate the community's efforts in creating a more secure world.


Intercom will rely on the Bugcrowd Vulnerability Rating Taxonomy for prioritization of findings- but reserve the right to either downgrade or upgrade findings’ severity based on the criticality of their underlying risk to Intercom. Appropriate payouts will then be awarded accordingly. Any downgraded submission with come with a full and detailed explanation.

Reward range

Last updated

Technical severity Reward range
p1 Critical $5,000 - $5,000
p2 Severe $1,500 - $1,500
p3 Moderate $300 - $300
p4 Low $100 - $100
P5 submissions do not receive any rewards for this program.


In scope

Target name Type Tags
  • Mobile Application Testing
  • iOS
  • Objective-C
  • Swift
  • SwiftUI
Android SDK Android
  • Mobile Application Testing
  • Android
  • Java
  • Kotlin Other
  • API Testing Other
  • Website Testing
  • Ruby on Rails
  • Ruby
* / * Other

All other domains/end-points other than those listed in the targets section, are out of scope.

Target info:

  • Inbox App Release Information:
  • iOS IPA and Android SDK available here:
  • API Documentation:
  • The target URLs are the same as those used by our real customers, please keep this in mind and act accordingly.
  • Automated vulnerability scans are strictly prohibited.
  • No attacks against Intercom's existing user base.
  • No phishing.
  • No DDoS attacks
  • This is Intercom's primary production environment. We accept valid PoCs of app-level Denial of Service vulnerabilities but PoCs that intentionally stress or risks the availability of our services will be considered an abuse
  • Create your own Intercom accounts (likely two, at least - for cross-org testing) to perform research against this app.
  • Do not create more than 4 apps as part of your testing. Failure to comply may result in your account being blacklisted, thanks!

How to sign up for an Intercom account / app:

Card number: 4847 1893 7292 0785 
Expiry: 05/27 
CVV: 290 
Country: United States
Street Address: 55 2nd Street
City: San Francisco
State: California 
Zip Code: 94111 

(Note: This is a disposable credit card created just for this Bug Bounty program and has the minimum credit assigned to it).

NOTE: Accounts and related data will be deleted 30 days after creation.

Focus Areas:

  • Cross site request forgery on critical actions
  • Cross site scripting (XSS), including those blocked by our Content Security Policy (CSP)
  • Remote code execution / shell injection
  • Authentication bypass
  • SQL injection
  • Insecure direct object references

Testing is only authorized on the targets listed as In-Scope. Any domain/property of Intercom not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you happen to identify a security vulnerability on a target that is not in-scope, but that demonstrably belongs to Intercom, it may be reported to this program, and is appreciated - but will ultimately be marked as 'not applicable' and will not be eligible for monetary or points-based compensation.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.