Connect with us

Hi, what are you looking for?



Twitter Launches Bug Bounty Program via HackerOne

In an effort to thank researchers who responsibly disclose security vulnerabilities, Twitter has introduced a bug bounty program powered by the HackerOne platform.

In an effort to thank researchers who responsibly disclose security vulnerabilities, Twitter has introduced a bug bounty program powered by the HackerOne platform.

Security experts have already reported tens of Twitter flaws over the past three months via HackerOne, but issues submitted before September 3, 2014 were not eligible for a monetary reward. However, from now on, those who report vulnerabilities on and its subdomains, Twitter for Android, and Twitter for iOS will be rewarded with a minimum of $140, the company said.

The good news is that a maximum reward limit has not been set, but Twitter has not revealed if it’s willing to pay as much as other major companies, which often hand out tens of thousands of dollars for a single serious security issue.

“Reward amounts may vary depending upon the severity of the vulnerability reported. Twitter will determine in its discretion whether a reward should be granted and the amount of the reward. This is not a contest or competition. Rewards may be provided on an ongoing basis so long as this program is active,” the social media company said on its HackerOne page.

Researchers will not get any money for reporting vulnerabilities found on other Twitter domains and applications than the ones mentioned before, but they can see their names listed in the company’s “Hall of fame.”

There are four main conditions that must be met by those who submit security holes: they must not be residents of sanctioned countries like Syria or North Korea, they must not publicly disclose their findings before Twitter gets a chance to roll out a patch, they must be the first to find the reported issue, and the reported vulnerability must be one from the list of qualifying vulnerabilities.

Vulnerability types that qualify for the program are cross-site scripting (XSS), cross-site request forgery (CSRF), remote code execution (RCE), unauthorized access to direct messages, and unauthorized access to protected tweets. Researchers are advised to use testing accounts, and refrain from spamming, launching denial-of-service attacks, or performing any other action that negatively impacts other customers.

Advertisement. Scroll to continue reading.

Twitter points out that reports of spam, social engineering Twitter staff, physical attacks, vulnerabilities that only affect users of outdated software, and unverified reports obtained with automated tools are out of scope.

Additional details on Twitter’s bug bounty program are available on HackerOne.

In May 2014, HackerOne secured $9 million in a Series A round of funding, and appointed Katie Moussouris, former senior security strategist lead at Microsoft, as the company’s chief policy officer.

Podcast: Katie Moussouris on HackerOne and Bug Bounties

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...


Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.