Zivver – Bug Bounty Program
Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive and save of sensitive content. To this end, we created a platform that delivers content governance, compliance, and protection to customers. The platform unifies, tracks, controls, and secures sensitive content moving within, into, and out of their organization, significantly improving risk management and ensuring regulatory compliance on all sensitive content communications.
Reward
Program
Hacktivity
Updates
December 2025
- Enabled Leaks and exposed credentials
- Enabled Systemic Issues grid
November 2025
- We made the program public and doubled the maximum bounty for critical vulnerabilities! 💰💰
July 2025
Launch of the program.
Zivver
Zivver offers secure communication solutions that help prevent data leaks. The Saas solution offers a web application and clients for Outlook, Outlook Web Access and Gmail. The product has:
- Zero-knowledge encryption (whitepaper)
- Human error prevention
- Large file transfer
- Email revocation
- Secure eSignatures
- Proof of Delivery
- Several enterprise features as role based access, SSO and reporting
With this bug bounty program, we want to reinforce our commitment to security and reward security researchers for helping us protect our customers' data.
Program Rules
Zivver wants to increase the security of its products by inviting security researchers to analyze the implementation of security measures in its product and to identify existing vulnerabilities. In order to achieve this goal together, it is important to us that the following rules are adhered to.
- Only attempt attacks using an account associated with your YesWeHack email alias. Any breach attempts from other accounts might be considered a threat to our customers and the associated accounts will be shut off without further notice. Other accounts than the ones associated with your YesWeHack email alias will not necessarily receive safe harbor protection.
- Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue may not be marked as triaged.
- Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
- When duplicates occur, we only triage the first report that was received (provided that it can be fully reproduced).
- Multiple vulnerabilities caused by one underlying issue will be treated as one valid report.
- Social engineering (e.g. phishing, vishing, smishing) is prohibited.
- Causing load-based issues by submitting an unreasonably large number of requests or transferring an excessive amount of data.
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
- Only interact with accounts you own or with explicit permission of the account holder.
- Do not change passwords of accounts (unless it’s your own) or delete other accounts.
- Do not publish (even partially) any vulnerabilities that are found.
🚫 Important!
Do not claim any domain related to YesWeHack (yeswehack.com, yeswehack.ninja) in the product once you received a business account!
This will make signups for other hunters impossible using their YesWeHack email alias. We will delete any account that claims any of those domains without notification.
Reward Eligibility
We are happy to thank everyone who submits valid reports to improve the security of our service, however only those that meet the following eligibility requirements may receive a monetary reward:
- You must be the first reporter of a vulnerability.
- The vulnerability must be a qualifying vulnerability (see below).
- Show meaningful impact: reports that note deviations from security 'best practices' but cannot present a clear proof of risk —such as flagging a missing X-Content-Type-Options header on a page that never handles user content—are ineligible for rewards, though we may accept the report for its informational value. This policy ensures we concentrate bounty funds on genuine, exploitable threats rather than theoretical issues.
- Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through YesWeHack.
- The vulnerability report must contain the following elements:
- A clear textual description of the vulnerability, how it can be exploited, its security impact and remediation advice.
- A proof of the exploitation of the vulnerability (e.g. screenshots, proof of concept code).
- The preconditions and steps required to reproduce the issue including code snippets, commands, request information, payloads, etc.
- You must not be a former or current employee of our company or one of its contractors.
XSS Reporting Requirements
Please note that for any reports involving Cross-Site Scripting (XSS), a basic proof-of-concept such as a JavaScript alert box (e.g., alert(1)) will not be considered sufficient for triage or reward. To qualify for a valid report, you must demonstrate a clear and actionable impact resulting from the XSS vulnerability. This includes, but is not limited to:
- Performing actions on behalf of another user (e.g., creating a new user account or modifying user settings)
- Exfiltrating sensitive data (e.g., sending authentication cookies or session tokens to an external server)
- Bypassing security controls or escalating privileges
The goal is to understand the real-world risk and exploitability of the issue, so please ensure your report includes a well-documented and impactful demonstration.
⚠️ Popular duplicate topics:
When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
- MULTIFACTOR AUTHENTICATION (MFA) 'BYPASS' on the web application (client-side): MFA is intended to be an optional feature, rather than a hard requirement, for Zivver users. While the app may presently appear to enforce a hard requirement for MFA in places, that is not a strategic intent and the design will be re-evaluated in upcoming releases. Please do not report client-side MFA bypass vulnerabilities here.
Useful links
Reward
| Asset value | CVSS | CVSS | CVSS | CVSS |
|---|---|---|---|---|
| $500 | $1,000 | $3,000 | $10,000 |
Systemic issues
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
Scopes
| Scope | Type | Asset value | Expand rewards grid |
|---|---|---|---|
app.zivver.com | Web application | ||
Low Medium High Critical | |||
owa-v6.zivver.com | API | ||
Low Medium High Critical | |||
collector.zivver.com | API | ||
Low Medium High Critical | |||
downloads.zivver.com | API | ||
Low Medium High Critical | |||
img.zivver.com | API | ||
Low Medium High Critical | |||
sign.zivver.com | Web application | ||
Low Medium High Critical | |||
https://play.google.com/store/apps/details?id=com.zivver.app | Mobile application Android | ||
Low Medium High Critical | |||
https://apps.apple.com/be/app/zivver/id1179528663 | Mobile application IOS | ||
Low Medium High Critical | |||
Zivver Outlook Plugin | Other | ||
Low Medium High Critical | |||
Zivver OWA add-in | Other | ||
Low Medium High Critical | |||
Zivver Chrome Extension | Other | ||
Low Medium High Critical | |||
Out of scopes
- Any other Zivver domain or service not explicitly mentioned in the scope
- hubspot.com which hosts our marketing webpage
- chargebee.com which is our subscription management partner
- Zivver Cloud Sync for Azure
- Synctool V2
Vulnerability types
Qualifying vulnerabilities
- SQL Injection (SQLi)
- Cross-Site Scripting (XSS)
- Remote Code Execution (RCE)
- Insecure Direct Object Reference (IDOR)
- Horizontal and vertical privilege escalation
- Authentication bypass & broken authentication
- Business Logic Errors vulnerability with real security impact
- Local files access and manipulation (LFI, RFI, XXE, SSRF, XSPA)
- Cross-Origin Resource Sharing (CORS) with real security impact
- Cross-site Request Forgery (CSRF) with real security impact
- Open Redirect
- Exposed secrets, credentials or sensitive information on an asset under our control and affecting at least one of our scopes
- Broken cryptographic implementation with working exploit
- Cleartext Transmission of Sensitive Information (passwords etc.)
Non-qualifying vulnerabilities
- Broken Link/Social media Hijacking
- Tabnabbing
- Missing cookie flags
- Content/Text injections
- Clickjacking/UI redressing
- Denial of Service (DoS) attacks
- Recently disclosed CVEs (less than 30 days sinces patch release)
- CVEs without exploitable vulnerabilities and PoC
- Open ports or services without exploitable vulnerabilities and PoC
- Social engineering of staff or contractors
- Presence of autocomplete attribute on web forms
- Vulnerabilities affecting outdated browsers or platforms
- Self-XSS or XSS that cannot be used to impact other users
- Any hypothetical flaw or best practices without exploitable vulnerabilities and PoC
- SSL/TLS issues (e.g. expired certificates, best practices)
- Unexploitable vulnerabilities (e.g. Self-XSS, XSS or Open Redirect through HTTP headers...)
- Reports with attack scenarios requiring MITM or physical access to victim's device
- Missing security-related HTTP headers which do not lead directly to an exploitable vulnerability and PoC
- Low severity Cross-Site Request Forgery (CSRF) (e.g. Unauthenticated / Logout / Login / Products cart updates...)
- Invalid or missing email security records (e.g. SPF, DKIM, DMARC)
- Session management issues (e.g. lack of expiration, no logout on password change, concurrent sessions)
- Disclosure of information without exploitable vulnerabilities and PoC (e.g. stack traces, path disclosure, directory listings, software versions, IP disclosure, 3rd party secrets, EXIF Metadata, Origin IP)
- CSV injection
- Malicious file upload (e.g. EICAR files, .EXE)
- HTTP Strict Transport Security Header (HSTS)
- Subdomain takeover without a full exploitable vulnerability and PoC or not applicable to the scope
- Blind SSRF without exploitable vulnerabilities and PoC (e.g. DNS & HTTP pingback, Wordpress XMLRPC)
- Lack or bypass of rate-limiting, brute-forcing or captcha issues
- User enumeration (e.g. email, alias, GUID, phone number, common CMS endpoints)
- Weak password policies (e.g. length, complexity, reuse)
- Ability to spam users (email / SMS / direct messages flooding)
- Disclosed or misconfigured public API keys (e.g. Google Maps, Firebase, analytics tools...)
- Password reset token sent via HTTP referer to external services (e.g. analytics / ads platforms)
- Stolen secrets, credentials or information gathered from a third-party asset that we have no control over
- Exposed secrets, credentials or information on an asset under our control that are not applicable to the program’s scope
- Pre-account takeover (e.g. account creation via oAuth)
- GraphQL Introspection is enabled
- Non sensitive information disclosure: stack traces, path disclosure, directory listings, software versions, etc
- Credential stuffing
- Logout and other instances of low-severity Cross-Site Request Forgery
- Enumeration/account oracles: possibility to enumerate phone number, email, GUID, etc. and receive back a message indicating it exists
- Missing security-related HTTP headers which do not lead directly to a vulnerability
- Race condition
Reports of leaks and exposed credentials
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and policy. To summarize our policy, you may refer to the below table:
Hunting requirements
Account access
- Please sign up for a freemium account here using your YesWeHack email alias: https://app.zivver.com/signup
- Complete account setup steps as outlined here: https://docs.zivver.com/en/guest/signup-for-zivver.html
🚫 Do not claim any domain associated with YesWeHack (e.g., yeswehack.com, yeswehack.ninja) in the product once you received a business account.
User agent
Please append to your user-agent header the following value: ' -bug-bounty-yeswehack-[your_username] '.
Hunters collaboration
When submitting new report, you can add up to 5 collaborators, and define the reward split ratio.
For more information, see help center.
Note: For reports that have already been rewarded, it is not possible to redistribute the rewards.