Help us improve our security and get rewarded
At NiceHatCRM, we believe in the power of community-driven security.
Our Bug Bounty Program invites security researchers, ethical hackers, and technology enthusiasts to help us identify potential security vulnerabilities in our platform. We value your expertise and are committed to working with you to address any findings promptly and thoroughly.
This program is designed to create a safe, collaborative environment for responsible disclosure while recognizing and rewarding the valuable contributions of security researchers.
Our Bug Bounty Program is currently active and accepting submissions. Last updated: April 07, 2025
The following domains and applications are covered by our Bug Bounty Program:
*.nicehatcrm.com
- All subdomains of nicehatcrm.comThe following are not part of our Bug Bounty Program:
Please do not test against production systems with actual customer data. We provide a dedicated sandbox environment for security researchers at sandbox.nicehatcrm.com
.
We're particularly interested in the following types of vulnerabilities:
Vulnerability Type | Description | Severity |
---|---|---|
Remote Code Execution (RCE) | Ability to execute arbitrary code on our servers | Critical |
SQL Injection | Ability to execute arbitrary SQL queries against our databases | Critical |
Authentication Bypass | Ability to bypass authentication mechanisms | Critical |
Server-Side Request Forgery (SSRF) | Ability to make server-side requests to internal resources | Critical |
Cross-Site Scripting (XSS) | Ability to execute arbitrary JavaScript in a user's browser | High |
Cross-Site Request Forgery (CSRF) | Ability to perform actions on behalf of another user | High |
Information Disclosure | Exposure of sensitive information | High |
Broken Access Control | Ability to access resources or perform actions without proper authorization | High |
Open Redirects | Ability to redirect users to arbitrary external domains | Medium |
Security Misconfigurations | Insecure default configurations, incomplete setups, or exposed error messages | Medium |
This is not an exhaustive list. We welcome reports on other security vulnerabilities that could impact the security of our platform or our users.
We offer monetary rewards based on the severity and impact of the vulnerability. Our reward structure is as follows:
Severity | Reward Range |
---|---|
Critical | $5,000 - $10,000 |
High | $1,000 - $5,000 |
Medium | $500 - $1,000 |
Low | $100 - $500 |
We offer additional bonuses for exceptional reports with clear proof of concepts, detailed impact assessments, and suggested remediation steps. We also maintain a public Hall of Fame for our top contributors.
We determine the severity of a vulnerability based on the Common Vulnerability Scoring System (CVSS) and our assessment of the potential impact on our systems and users.
To submit a vulnerability report, please follow these steps:
A complete submission should include:
Title: [Vulnerability Type] in [Affected Component]
Description:
[Detailed explanation of the vulnerability]
Steps to Reproduce:
1. [First step]
2. [Second step]
3. [And so on...]
Impact:
[Explanation of the potential impact]
Suggested Fix:
[Your recommendations for addressing the issue]
Additional Information:
[Any other relevant details]
We will not pursue legal action against you for security research conducted in accordance with these guidelines. However, this does not grant permission to violate any other applicable laws or regulations.
We'd like to thank the following security researchers for their valuable contributions to our Bug Bounty Program:
@alexj_security
5 Critical Findings@maria_infosec
8 High Findings@dkim_security
12 Medium Findings