-
Notifications
You must be signed in to change notification settings - Fork 228
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
2 changed files
with
175 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,172 @@ | ||
# Bug Bounty Program | ||
------------------------------------ | ||
|
||
## Program Guidelines | ||
|
||
1. You must use your own Kagi account when researching bugs. | ||
2. Using third-party accounts without consent is strictly prohibited. | ||
3. Manual testing only. Automated scanning tools are not permitted | ||
4. Bugs and security concerns should be addressed to [email protected] | ||
5. You should be the first person to report the bug to be entitled for a reward. | ||
6. Compensation will be based on the severity of the bug finding. | ||
7. Bug Bounty rewards will be paid by PayPal in U.S. dollars after the bug is fixed. | ||
Security research should follow industry standards, and no legal actions should be initiated against | ||
security researchers as long as they comply with this policy and guidelines. | ||
|
||
|
||
## Bounty Process | ||
|
||
### Initial Report Submission | ||
|
||
All security vulnerabilities must be reported to [email protected] with the following mandatory components: | ||
|
||
- Detailed step-by-step reproduction instructions | ||
- Technical description of the vulnerability | ||
- Affected URLs, parameters, or endpoints | ||
- Impact assessment and potential exploitation scenarios | ||
- Environment details (browser, OS, etc.) | ||
|
||
|
||
### Required Evidence | ||
|
||
Your submission must include: | ||
|
||
- Clear visual documentation (choose at least one): | ||
- Screenshots of the vulnerability | ||
- Screen recordings demonstrating the exploit | ||
- GIF demonstrations of the issue | ||
- Proof of concept code (if applicable) | ||
|
||
|
||
### Validation Requirements | ||
|
||
Before submission, ensure: | ||
|
||
- The vulnerability is reproducible in a clean environment | ||
- Multiple successful test confirmations are completed | ||
- The issue is not related to cached data Tests are performed across different conditions to confirm consistency | ||
|
||
|
||
### Review Process | ||
|
||
Our security team will: | ||
|
||
1. Acknowledge receipt within 24-48 hours | ||
2. Perform initial triage to verify: | ||
- Uniqueness of the report | ||
- Current fix status | ||
- Reproduction of the issue | ||
3. Assess severity level according to the reward matrix | ||
4. Communicate the assessed reward amount | ||
5. Provide regular updates on fix progress | ||
|
||
|
||
### Resolution & Reward | ||
|
||
Upon successful resolution: | ||
|
||
- Confirmation of fix implementation | ||
- Verification request sent to reporter | ||
- PayPal payment is processed after fixed verification | ||
- Case closure notification sent | ||
|
||
|
||
## Reward Matrix | ||
|
||
Bounty rewards are subject to assessment, depending on the severity of the report and the impact on users. | ||
|
||
### Critical Severity ($500-$1,000) | ||
|
||
- Remote Code Execution (RCE) | ||
- Ability to execute arbitrary code on servers | ||
- Command injection vulnerabilities | ||
- File upload leading to code execution | ||
- SQL Injection with data breach potential | ||
- Access to sensitive database contents | ||
- Ability to modify database records | ||
- Database dump capabilities | ||
- Authentication bypass affecting all users | ||
- Complete bypass of login mechanisms | ||
- Session prediction/manipulation | ||
- Token forgery | ||
- Production database access | ||
- Direct database connection exposure | ||
- Database credential exposure | ||
- Backup file access | ||
- Payment system vulnerabilities | ||
- Price manipulation | ||
- Transaction tampering | ||
- Payment flow bypass | ||
|
||
### High Severity ($100-$500) | ||
|
||
- Stored Cross-Site Scripting (XSS) | ||
- Persistent payload execution | ||
- Admin panel XSS | ||
- Multi-user impact | ||
- Server-Side Request Forgery (SSRF) | ||
- Internal network access | ||
- Cloud metadata access | ||
- Service enumeration | ||
- Local File Inclusion (LFI) | ||
- Configuration file access | ||
- Source code disclosure | ||
- System file reading | ||
- Privilege Escalation | ||
- Horizontal privilege escalation | ||
- Vertical privilege escalation | ||
- Role manipulation | ||
|
||
### Moderate Severity ($50-$100) | ||
|
||
- Reflected XSS | ||
- URL-based XSS | ||
- Search parameter manipulation | ||
- Form field injection | ||
- Cross-Site Request Forgery (CSRF) | ||
- State-changing actions | ||
- Account modification | ||
- Settings manipulation | ||
- Information Disclosure | ||
- Stack traces | ||
- Version information | ||
- Insecure Direct Object References | ||
- Unauthorized resource access | ||
- Parameter manipulation | ||
- ID enumeration | ||
|
||
#### Low Severity ($0-$50) | ||
|
||
- Security Header Issues | ||
- Missing HSTS | ||
- Incomplete CSP | ||
- X-Frame-Options issues | ||
- SSL/TLS Configuration | ||
- Weak cipher suites | ||
- Protocol vulnerabilities | ||
- Certificate issues | ||
- CORS Misconfiguration | ||
- Overly permissive origins | ||
- Preflight bypass | ||
- Credential exposure | ||
|
||
|
||
## Exclusions | ||
|
||
The following bugs are unlikely to be eligible for a bounty reward: | ||
|
||
- DoS/DDoS attacks | ||
- Brute force attempts | ||
- Rate limiting issues | ||
- Social engineering | ||
- Physical security | ||
- Self-XSS | ||
- Scanner-generated reports | ||
- Third-party vulnerabilities | ||
- Password complexity issues | ||
- Non-exploitable issues: | ||
- Clickjacking without impact | ||
- CSRF on public actions | ||
- Missing security headers without exploit | ||
- Version number disclosure | ||
- Path disclosure |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -8,6 +8,8 @@ The audit found Kagi to be "Highly Secure" with "…no findings of material sign | |
|
||
## Kagi Bug Bounty Program | ||
|
||
The Kagi Bug Bounty Program is subject to the legal terms and conditions outlined in our [bounty Safe Harbor policy](safe-harbor.md). | ||
|
||
If you believe you’ve discovered a security or privacy vulnerability that affects Kagi services or software, please report it to our [security contact](mailto:[email protected]). We review all eligible research for Kagi Bug Bounty rewards. | ||
|
||
The Kagi Bug Bounty Program is subject to the legal terms and conditions outlined in our [bounty Safe Harbor policy](safe-harbor.md). | ||
Follow our [bug bounty program](bug-bounty-program.md) to learn how to report. |