Security Bounty Program | Report submission
At Hunter, the security of our users’ data is a priority. We build our software and infrastructure with this goal in mind. That’s why we decided to welcome help from the outside through our bounty program to put our security to the test!

Before submitting a new report, please make sure that it complies with our rules and isn't part of our non-qualifying vulnerabilities as listed on

We'll come back to you quickly once we received your report.

Thanks for your help and happy hunting!
Sign in to Google to save your progress. Learn more
Name *
Email *
Vulnerability type *
Is the vulnerability you're reporting a Cross-Site Scripting, a Cross-Site Request Forgery, a Clickjacking, an Authentication or authorization issue, etc.?
Technical details of the vulnerability *
Please describe the technical details of the vulnerability, so we can reproduce it on our side. A step-by-step description is recommended!
Scope and impact of the vulnerability *
Please explain who can exploit the vulnerability and what they gain when doing so.
Feel free to paste the link of any attachment (video, picture) that illustrates the vulnerability.
Confirmation *
Clear form
Never submit passwords through Google Forms.
This form was created inside of Hunter Web Services, Inc.. Report Abuse