Skip to content

Commit

Permalink
add bug bounty program
Browse files Browse the repository at this point in the history
  • Loading branch information
mozedz committed Jan 21, 2025
1 parent e803907 commit 1c5d144
Show file tree
Hide file tree
Showing 2 changed files with 175 additions and 1 deletion.
172 changes: 172 additions & 0 deletions docs/kagi/privacy/bug-bounty-program.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,172 @@
# Bug Bounty Program
------------------------------------

## Program Guidelines

1. You must use your own Kagi account when researching bugs.
2. Using third-party accounts without consent is strictly prohibited.
3. Manual testing only. Automated scanning tools are not permitted
4. Bugs and security concerns should be addressed to [email protected]
5. You should be the first person to report the bug to be entitled for a reward.
6. Compensation will be based on the severity of the bug finding.
7. Bug Bounty rewards will be paid by PayPal in U.S. dollars after the bug is fixed.
Security research should follow industry standards, and no legal actions should be initiated against
security researchers as long as they comply with this policy and guidelines.


## Bounty Process

### Initial Report Submission

All security vulnerabilities must be reported to [email protected] with the following mandatory components:

- Detailed step-by-step reproduction instructions
- Technical description of the vulnerability
- Affected URLs, parameters, or endpoints
- Impact assessment and potential exploitation scenarios
- Environment details (browser, OS, etc.)


### Required Evidence

Your submission must include:

- Clear visual documentation (choose at least one):
- Screenshots of the vulnerability
- Screen recordings demonstrating the exploit
- GIF demonstrations of the issue
- Proof of concept code (if applicable)


### Validation Requirements

Before submission, ensure:

- The vulnerability is reproducible in a clean environment
- Multiple successful test confirmations are completed
- The issue is not related to cached data Tests are performed across different conditions to confirm consistency


### Review Process

Our security team will:

1. Acknowledge receipt within 24-48 hours
2. Perform initial triage to verify:
- Uniqueness of the report
- Current fix status
- Reproduction of the issue
3. Assess severity level according to the reward matrix
4. Communicate the assessed reward amount
5. Provide regular updates on fix progress


### Resolution & Reward

Upon successful resolution:

- Confirmation of fix implementation
- Verification request sent to reporter
- PayPal payment is processed after fixed verification
- Case closure notification sent


## Reward Matrix

Bounty rewards are subject to assessment, depending on the severity of the report and the impact on users.

### Critical Severity ($500-$1,000)

- Remote Code Execution (RCE)
- Ability to execute arbitrary code on servers
- Command injection vulnerabilities
- File upload leading to code execution
- SQL Injection with data breach potential
- Access to sensitive database contents
- Ability to modify database records
- Database dump capabilities
- Authentication bypass affecting all users
- Complete bypass of login mechanisms
- Session prediction/manipulation
- Token forgery
- Production database access
- Direct database connection exposure
- Database credential exposure
- Backup file access
- Payment system vulnerabilities
- Price manipulation
- Transaction tampering
- Payment flow bypass

### High Severity ($100-$500)

- Stored Cross-Site Scripting (XSS)
- Persistent payload execution
- Admin panel XSS
- Multi-user impact
- Server-Side Request Forgery (SSRF)
- Internal network access
- Cloud metadata access
- Service enumeration
- Local File Inclusion (LFI)
- Configuration file access
- Source code disclosure
- System file reading
- Privilege Escalation
- Horizontal privilege escalation
- Vertical privilege escalation
- Role manipulation

### Moderate Severity ($50-$100)

- Reflected XSS
- URL-based XSS
- Search parameter manipulation
- Form field injection
- Cross-Site Request Forgery (CSRF)
- State-changing actions
- Account modification
- Settings manipulation
- Information Disclosure
- Stack traces
- Version information
- Insecure Direct Object References
- Unauthorized resource access
- Parameter manipulation
- ID enumeration

#### Low Severity ($0-$50)

- Security Header Issues
- Missing HSTS
- Incomplete CSP
- X-Frame-Options issues
- SSL/TLS Configuration
- Weak cipher suites
- Protocol vulnerabilities
- Certificate issues
- CORS Misconfiguration
- Overly permissive origins
- Preflight bypass
- Credential exposure


## Exclusions

The following bugs are unlikely to be eligible for a bounty reward:

- DoS/DDoS attacks
- Brute force attempts
- Rate limiting issues
- Social engineering
- Physical security
- Self-XSS
- Scanner-generated reports
- Third-party vulnerabilities
- Password complexity issues
- Non-exploitable issues:
- Clickjacking without impact
- CSRF on public actions
- Missing security headers without exploit
- Version number disclosure
- Path disclosure
4 changes: 3 additions & 1 deletion docs/kagi/privacy/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,8 @@ The audit found Kagi to be "Highly Secure" with "…no findings of material sign

## Kagi Bug Bounty Program

The Kagi Bug Bounty Program is subject to the legal terms and conditions outlined in our [bounty Safe Harbor policy](safe-harbor.md).

If you believe you’ve discovered a security or privacy vulnerability that affects Kagi services or software, please report it to our [security contact](mailto:[email protected]). We review all eligible research for Kagi Bug Bounty rewards.

The Kagi Bug Bounty Program is subject to the legal terms and conditions outlined in our [bounty Safe Harbor policy](safe-harbor.md).
Follow our [bug bounty program](bug-bounty-program.md) to learn how to report.

0 comments on commit 1c5d144

Please sign in to comment.