DataDome Bug Bounty
Online fraud & bot management for mobile apps, websites & APIs
Reward
Program
Hacktivity
Scope
The scope of the bug bounty is :
Function | Domain |
---|---|
Customer Dashboard | app.datadome.co |
Customer API | customer-api.datadome.co |
Java Script | js.datadome.co |
Captcha | *.captcha-delivery.co |
Server Site API used by modules | api.datadome.co |
Client Side API used by JS or SDK | api-js.datadome.co |
Corporate Site | datadome.co or www.datadome.co |
Server-Side modules (in customer infrastructure) | docs.datadome.co |
Authentication | auth.datadome.co |
You can find all the information you need about DataDome on https://docs.datadome.co/docs
readme.com third-party is out of scope
auth.datadome.co is managed by Auth0 Third-Party, only DataDome direct vulnerability will be rewarded
Keep in mind this is a production environment, no data alterations are allowed inside DataDome infrastructure or on DataDome customer Cloud infrastructure, and, therefore, you must not affect the availability of the platform.
Testing Policy and Responsible Disclosure
Please adhere to the following rules while performing research on this program:
- Denial of service (DoS) attacks on DataDome applications, servers, networks or infrastructure are strictly forbidden.
- Avoid tests that could cause degradation or interruption of our services.
- Do not use automated scanners or tools that generate a large amount of network traffic.
- Only perform tests against your own accounts to protect our users' privacy.
- Do not leak, manipulate, or destroy any user data or files in any of our applications/servers.
- Do not copy any files from our applications/servers and disclose them.
- No vulnerability disclosure, full, partial or otherwise, is allowed.
Reward Eligibility
We are happy to thank everyone who submits valid reports which help us improve the security of DataDome, however only those that meet the following eligibility requirements may receive a monetary reward:
- You must be the first reporter of a vulnerability.
- The vulnerability must be a qualifying vulnerability (see below).
- The report must contain the following elements:
- Clear textual description of the vulnerability, how it can be exploited, the security impact it has on the application, its users and DataDome, and remediation advice on fixing the vulnerability.
- Proof of exploitation: screenshots and/or videos demonstrating the exploit was performed, and showing the final impact.
- Provide complete steps with the necessary information to reproduce the exploit, including (if necessary) code snippets, payloads, commands etc
- You must not break any of the testing policy rules listed above
- You must not be a former or current employee of DataDome or one of its contractors.
Our security team will review each committed finding and establish communication as soon as possible to reproduce and solve the reported vulnerability. Please allow 5 working days for our initial response. We ask you to make a good faith effort to avoid privacy violations, destruction of data and interruption or degradation of our service during your research.
Reward
Asset value | CVSS | CVSS | CVSS | CVSS |
---|---|---|---|---|
€50 | €300 | €1,000 | €3,000 | |
€50 | €200 | €500 | €1,000 |
Scopes
Scope | Type | Asset value | Expand rewards grid |
---|---|---|---|
https://app.datadome.co | web-application | ||
Low Medium High Critical | |||
https://customer-api.datadome.co | api | ||
Low Medium High Critical | |||
https://api.datadome.co | api | ||
Low Medium High Critical | |||
https://api-js.datadome.co | api | ||
Low Medium High Critical | |||
https://*.captcha-delivery.com | web-application | ||
Low Medium High Critical | |||
https://auth.datadome.co | web-application | ||
Low Medium High Critical | |||
https://datadome.co | web-application | ||
Low Medium High Critical | |||
https://bot-tester.datadome.co/ | web-application | ||
Low Medium High Critical |
Out of scopes
- All domains not listed In-Scope
- Third-party widgets on www.datadome.co and app.datadome.co
Vulnerability types
Qualifying vulnerabilities
- Broken Authentication and Session Management
- Cross-Site Scripting (XSS), Cross-site Request Forgery (CSRF), Server-Side Request Forgery (SSRF)
- SQL Injection
- Remote Code Execution (RCE)
- Directory Traversal Issues / Local File Disclosure
- Breach in the multi-tenant system (eg : Sensitive Data Exposure)
- Security Misconfiguration
- Missing Function Level Access Control
Non-qualifying vulnerabilities
- Any hypothetical flaw or best practices without exploitable POC
- Unverified results of automated tools or scanners
- Missing security-related HTTP headers which do not lead directly to a vulnerability
- Mixed content warnings
- Vulnerabilities that are already publicly known or variations of such
- Vulnerabilities on other products or services than listed above
- Issues in our DNS, NTP or SMTP
- DNS Dangling or SubDomain takeover without a real exploitable POC
- Clickjacking/UI redressing
- Software version disclosure without a real exploitable POC
- Stack traces or path disclosure without a real exploitable POC
- Vulnerabilities affecting outdated browsers or platforms
- Issues that require physical access to a victim’s computer/device
- Logout and other instances of low-severity Cross-Site Request Forgery
- Issues not leading to a confidentiality, traceability or integrity problem. You can report it to support@datadome.co This can help you to have a better experience and help you in your research
- Bot detection capability
- Brute-force attack
- DataDome cookie doesn't have the secure flag
- Using old TLS configuration on "Protection API" (needed for retro-compatibility with DataDome module installed)
- Social engineering of DataDome employees and contractors
- Attack against DataDome office (malware, backdoor, DoS, …)
- Denial of service attacks
- DMARC vulnerabilities on datadome.co mail
- CSV injection vulnerabilities
- 3rd parties security issues (Auth0, Readme.com...)
Hunting requirements
Account access
You can get a trial account that will give you a legit access to our API by going to the address https://datadome.co/free-signup/.
DataDome Documentation is here: https://docs.datadome.co/docs/getting-started
You must use your Yeswehack alias (@yeswehack.ninja) as an e-mail to signup.
Please put in "Website to Protect": bugbounty.datadome.co
Once the setup panel is displayed in the Dashboard, you can retrieve the server key and client key and you must send traffic to 2 API:
curl 'https://api.datadome.co/validate-request/' --data RequestModuleName=yeswehack --data ModuleVersion=1 --data IP=0.0.0.0 --data Request=/ --data Key=YOUR-SERVER-API-KEY
curl 'https://api-js.datadome.co/js/' --data-raw 'ddk=YOUR-CLIENT-KEY'
Hunters collaboration
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see help center.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.