Security Bounty Program | Report submission
At Hunter, the security of our users’ data is a priority. We build our software and infrastructure with this goal in mind. That’s why we decided to welcome help from the outside through our bounty program to put our security to the test!

Before submitting a new report, please make sure that it complies with our rules and isn't part of our non-qualifying vulnerabilities as listed on

We'll come back to you quickly once we received your report.

Thanks for your help and happy hunting!
Name *
Your answer
Email *
Your answer
Vulnerability type *
Is the vulnerability you're reporting a Cross-Site Scripting, a Cross-Site Request Forgery, a Clickjacking, an Authentication or authorization issue, etc.?
Your answer
Technical details of the vulnerability *
Please describe the technical details of the vulnerability, so we can reproduce it on our side. A step-by-step description is recommended!
Your answer
Scope and impact of the vulnerability *
Please explain who can exploit the vulnerability and what they gain when doing so.
Your answer
Feel free to paste the link of any attachment (video, picture) that illustrates the vulnerability.
Your answer
Confirmation *
Never submit passwords through Google Forms.
This form was created inside of Hunter. Report Abuse