• Points per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

45 vulnerabilities rewarded

Validation within 5 days
75% of submissions are accepted or rejected within 5 days

Latest hall of famers

Recently joined this program

Our platform of secure edge services is developed in pursuit of our ultimate mission: to make the internet safe. We greatly value the hard work and genius of the internet security research community, and welcome reports of any discovered StackPath platform vulnerability.

If you identify a vulnerability in our platform please notify us right away through the methods outlined in our Vulnerability Disclosure Program. We investigate all reported vulnerabilities and resolve identified issues as quickly as possible. We appreciate your efforts and cooperation avoiding privacy violations, damaging data, or otherwise interrupting or causing a negative impact on any of our services as you conduct your research.


For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.


In scope

Target name Type
* Website
* Website
* Other
Any publicly facing host or service owned by StackPath - (ip space, domains, etc) Other
Any product/service offered by StackPath (CDN/DNS/WAF/etc) Other

Out of scope

Target name Type
StackPath customer instances (e.g. *, * Website

Testing is only authorized on the targets listed as In-Scope. Any domain/property of StackPath not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you believe you've identified a vulnerability on a system outside the scope, please reach out to before submitting.

Target info:

  • *, * is used for all public services, including the main website, customer portal, API, ssh, mail, etc.

  • * is generally used for internal company resources/services


All of the above targets are publicly accessible, researchers are encouraged to create trial accounts to test with, or utilize any existing accounts already legally owned. Please DO NOT perform any testing against accounts you do not expressly own.

Out of Scope:

  • Customer owned CDN sites not personally owned by the researcher are not in scope (e.g. *, *

Additional Information:

  • Researchers are encouraged to check our status page for any ongoing issues that may interfere with testing.

Program rules

This program follows Bugcrowd’s standard disclosure terms.