Security Bounty Program | Report submission
At Hunter, the security of our users’ data is a priority. We build our software and infrastructure with this goal in mind. That’s why we decided to welcome help from the outside through our bounty program to put our security to the test!
Before submitting a new report, please make sure that it complies with our rules and isn't part of our non-qualifying vulnerabilities as listed on
We'll come back to you quickly once we received your report.
Thanks for your help and happy hunting!
Is the vulnerability you're reporting a Cross-Site Scripting, a Cross-Site Request Forgery, a Clickjacking, an Authentication or authorization issue, etc.?
Technical details of the vulnerability
Please describe the technical details of the vulnerability, so we can reproduce it on our side. A step-by-step description is recommended!
Scope and impact of the vulnerability
Please explain who can exploit the vulnerability and what they gain when doing so.
Feel free to paste the link of any attachment (video, picture) that illustrates the vulnerability.
I confirm the reported vulnerability doesn't rely on social engineering
I confirm the reported vulnerability isn't part of our Non-Qualifying exploits (
) or our Non-Qualifying reports (
I confirm the reported vulnerability is on
Never submit passwords through Google Forms.
This form was created inside of Hunter Web Services, Inc..