Security Bug Bounty

We're committed to making Snipp the best it can be, and that means squashing bugs quickly. If you've encountered an issue or discovered something that isn't working quite right, we want to know about it! We appreciate every contribution—happy hunting!

Our Commitment

  • We will never pursue legal action against anyone who reports vulnerabilities in good faith and follows the guidelines on this page.

  • We aim to acknowledge every report within 48 hours and will keep you updated throughout the resolution process.

  • Depending on the severity and impact of your finding, you may be eligible for an exclusive profile badge and free months of our PLUS subscription.

Researcher Badges

Researchers who make meaningful contributions to Snipp's security can earn profile badges displayed publicly on their account.

Bug Hunter

Awarded after 3-5 exceptional bug reports. Demonstrates consistent contributions to Snipp's user experience and security.

Elite Bug Hunter

Awarded for discovering vulnerabilities or submitting critical reports. Reserved for active researchers who uncover the most impactful issues.

Guidelines

  • All testing must be performed on your own accounts. Never interact with or impact other users' data or accounts.

  • Only Snipp-operated services are in scope. Reports targeting third-party platforms, even those integrated via our API, will not be accepted.

  • Avoid any activity that could degrade our services or compromise data integrity—this includes brute forcing, DoS, spamming, and timing-based attacks.

  • Automated scanning tools are not allowed. All testing should be done manually.

  • We may temporarily exclude certain vulnerability classes from scope while we address them internally. Any changes will be reflected on this page.

  • Please keep all findings confidential until we've fully investigated and resolved the issue.

How We Handle Reports

Responsible disclosure is the best way to help us fix issues quickly while minimizing risk. When you report directly to us, we can begin working on a fix immediately without exposing the vulnerability to bad actors.

Findings that are shared publicly before we've had a chance to address them—whether on social media, forums, or anywhere else—will not be eligible for badge recognition. We want to credit the people who give us the opportunity to fix things first.

If multiple people report the same issue, we'll evaluate submissions based on:

  • Clarity of the technical explanation

  • How well the report conveys the real-world impact

  • Timestamp of submission

We genuinely appreciate every researcher who takes the time to help make Snipp safer.

What's Not in Scope

Before submitting, think about whether the issue has a realistic attack scenario and a meaningful security impact. The following are generally excluded:

  • Account enumeration

  • Attacks requiring MITM or physical access to a user's device

  • Brute force attacks

  • Clickjacking

  • Content spoofing and text injection

  • CSRF vulnerabilities

  • Denial of Service attacks where the outcome is resource exhaustion

  • Email SPF, DKIM, and DMARC records

  • Missing HttpOnly/Secure cookie flags

  • Open CORS headers

  • Rate limiting

  • Reports from scanners and automated tools

  • Self-exploitation (like token reuse and console scripting)

  • Social engineering or phishing attacks targeting users or staff

Additional Notes

Third-Party Services

External services, partners, and integrations are outside the scope of this program. Only vulnerabilities in Snipp-owned features and APIs qualify. Reports must show a clear security impact to Snipp itself.

Credential & Token Theft

Any scenario where an attacker could obtain another user's API keys, session tokens, or credentials without relying on social engineering is considered in scope.

Website Crashes

Reproducible website crashes caused by crafted input or normal user interaction are considered in scope, provided they do not depend on resource exhaustion, spam, or other denial-of-service techniques.

Race Conditions

Reports that depend on exploiting a race condition need additional evidence to be accepted. Please include at least one of the following:

  • A reproducible script (Python or JavaScript preferred, though other languages are fine)

  • A thorough writeup covering the HTTP methods, endpoints, and exact request ordering needed to trigger the condition

Including a script makes it much easier for us to verify the issue and speeds up the review process.

Found something?

Send us an email with a clear description of the issue, steps to reproduce, and any supporting evidence. We'll get back to you as soon as we can.

More articles