Program stats

203 vulnerabilities rewarded

Validation within 1 day
75% of submissions are accepted or rejected within 1 day

$950 average payout (last 3 months)

Latest hall of famers

Recently joined this program

900 total

Welcome to the Bug Bounty!

The BRAND NEW piece of scope here is the Jet API! please check out the instructions below on how to access it!

At we greatly value the security of our site and resources, and the community of security researches that helps keep us safe. We appreciate everyone who looks at our site, and especially those who make us aware of issues and help us to fix them.

We award kudos nearly immediately after a submission (If it is accepted), and will move states around without awarding $$$ first. DO NOT BE ALARMED! You will get your award! We do this so we can be as quick and accurate with our rewards as possible.

This bounty requires explicit permission to disclose the results of a submission.

Questions, comments, or suggestions? Reach out to us at security['at']

Web Application Vulns

We are looking for vulnerabilities in the below publicly facing web applications. That includes most anything that could potentially impact that site or its users. This is straightforward and very open when it comes to scope for the type of vulnerability, but please refer to the targets page to see exactly what is in scope. Our Bug Bounty has been open for some time, so **automated tools will generally not produce results.**


For (Our Main Ecommerce Site):
  • Please create an account at
  • You MUST use your Bugcrowd email alias when registering for an account.
  • Ex: [Bugcrowd Username}
  • Some useful information can be found here -
For (Our Merchant Portal):
  • Navigate to
  • Click "Apply now" In the top right hand corner.
  • Click either "Brand Manufacturer" or "Retailer" (Does not matter).
  • Use [your_bugcrowd_username] as the email.
  • Use "Bugcrowd" as the "Legal business name"
  • Use 000000000 (9 zero's) as the "Tax Identification Number"
  • Your account will be approved within 72 hrs of request!
  • API Documentation for this site can be found at
    • Remember to change all URL's to in the API calls.
For the Jet API (
  • Open up postman and load in the provided collection. (
  • Under the "auth" folder, you will see 4 requests
  • Make an account on
  • Fill in your credentials as environment varibales in postman.
  • Make all 4 requests in order.
  • In the responses you will recieve all of the toklens and keys needed to operate the API.
  • Start Testing!!! Please Check out the API Documentation at


Please note that for *, any part of * that is not explicitly mentioned in the out of scope section, is in scope; however, please ensure that you review the out-of-scope section, so as to ensure that you're only testing on hosts that are in scope. Thanks!


Specific things we like giving lots of money for:

Type Payout
Significant XSS $1,000 - $5,000
Authentication Bypass Up to $15,000
Vert/Horizontal Privilege Escalation $3,000 - $10,000
Significant Data Exposure Up to $10,000
Shell/RCE $5,000 - $15,000 and a discussion about the potential for a job at jet.

General Payout:

Severity Payout
P1 $8,000 - $15,000
P2 $3,000 - $8,000
P3 $500 - $3,000
P4 $100 - $500

This program adheres to the Bugcrowd Vulnerability Rating Taxonomy for the rating/prioritization of findings.

In Scope Items:

Site/Address What it is Copy of for Testing. (See Instructions Section) Copy of Jet Partner Portal for Testing (See Instructions Section) QA API (See Instructions Section)
* Any subdomain of EXLUDING THOSE THAT ARE OUT OF SCOPE/3rd Party Services.
* Any Subdomain of EXCLUDING * (See out of scope).
Android Application
IOS Application Customer Service Portal Jet Blog Static Image Hoster Prod Jenkins Jet Brand Style Guide Jet Tech Blog Jet Thor Application
Additional Subdomains Found at Bottom of this Page!

Additional In-Scope Items:

All below Subdomains are in Scope

Out of Scope Items:

Site/Addres Why is the same exact app just made for testing! is the same exact app just made for testing! 3rd Party Service 3rd Party Service 3rd Party Service 3rd Party Service 3rd Party Service 3rd Party Service 3rd Party Service 3rd Party Service

Additional Out of Scope Items:

  • Physical security of Jet buildings. Please do not attempt to sneak into our premises either secretly or by using social engineering.
  • Phishing/Social Engineering Attacks against Jet Employees.
  • Any subsidiaries, parents, affiliates are not in scope unless explicitly mentioned in the in scope section.
  • Outdated software versions are subject to a 72-hour blackout period to grant time for internal patching and testing (for instance, issues resulting from a 0day, etc). Rewards will not be given for outdated software versions reported during this period.
  • Any global scope security defects in the Microsoft Azure platform.
  • Clickjacking
  • Rate Limiting Issues
  • Missing SPF on Non-Email Domain (i.e.


This program follows Bugcrowd’s standard disclosure terms.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.