The Stanford Bug Bounty program is an experiment in improving the university’s cybersecurity posture through formalized community involvement. Subject to the terms below, the Information Security Office is offering rewards for the responsible discovery and disclosure of system vulnerabilities.
Stanford reserves the right to not reward any submission if we so choose, and we will not provide compensation for time spent researching.
Bounties are awarded only to the first unique report of a previously unidentified vulnerability. Subsequent reports will be closed as duplicates and not eligible for a bounty.
Vulnerability severities and reward amounts are determined at the discretion of the Information Security Office. For instance, a cross-site scripting vulnerability on a static, unauthenticated website may be classified as less severe compared to a cross-site scripting vulnerability that has the potential to compromise user accounts.
Cumulative rewards in excess of $50 are taxable, and you must report it as income on your tax returns.
Reward amounts and vulnerability severity classifications are subject to change at any time.
Severity | Reward Amount (in USD) |
---|---|
Critical | $500-$1,000 |
High |
$500-$800 |
Medium | $50-$100 |
Low | $50 |
Accepted Risk or Informational | $0 |
Vulnerability | Severity Range | Points |
---|---|---|
Remote Code Execution | Critical | 500 |
SQL Injection | High - Critical | 500 |
XXE | High - Critical | 500 |
XSS | Medium - Critical | 300 |
Server-Side Request Forgery | Low - Critical | 300 |
Directory Traversal - Local File Inclusion | Medium - High | 300 |
Authentication/Authorization Bypass (Broken Access Control) | Medium - High | 300 |
Privilege Escalation | Medium - High | 300 |
Insecure Direct Object Reference | Medium - Critical | 300 |
Misconfiguration | Low - High | 200 |
Web Cache Deception | Low - Medium | 100 |
CORS Misconfiguration | Low - Medium | 100 |
CRLF Injection | Low - Medium | 100 |
Cross Site Request Forgery | Low - Medium | 100 |
Open Redirect | Low - Medium | 50 |
Information Disclosure | Low - Medium | 50 |
Request smuggling | Low - Medium | 50 |
In addition to being eligible for the Bug Hunter Wizard tier of badges, reports that are received with a clear impact statement and detailed remediation recommendations will receive 100 bonus points for their submissions.
Reports on systems classified as High Risk will receive the highest bounty for the vulnerabilities’ severity range.
When conducting vulnerability research within the terms of this program, we consider such research to be:
You are expected, as always, to comply with all applicable laws. Any unauthorized activity outside the terms of this program will be subject to disciplinary and/or legal action pursuant to applicable laws and Stanford policies.
If at any time you have concerns or are uncertain whether your security research is consistent with the terms of this program, please submit your question via the vulnerability submission form.
Out-of-scope submissions will be accepted and acted upon, but are not eligible for bounty. If you become aware of a vulnerability involving an out-of-scope domain, it is still appropriate to report the vulnerability via this program, and the same safe harbor provisions apply to protect those who responsibly report.
Last updated May 2024
Username | Reputation Points | Number of Submissions |
---|---|---|
hawklin |
450 |
2 |
mccain |
400 |
1 |
saligrama |
400 |
1 |
zstjohn |
400 |
1 |
mavlevin |
300 |
1 |
akshay01 |
300 |
1 |
ghusman | 100 | 1 |
rlama22 | 50 | 1 |
brianamb | 50 | 1 |
sheamck | 50 | 1 |
Cardinal Tree Tier | Description |
---|---|
Cardinal Tree Tier 1 | This icon is given to security researchers on their first submission |
Cardinal Tree Tier 2 | Awarded to security researchers who submit 5+ reports |
Cardinal Tree Tier 3 | Awarded to security researchers who submit 10+ reports |
Bug Hunter Wizard Tier | Description |
---|---|
Bug Wizard Tier 1 | Awarded to security researchers who submit 20+ reports and provide clear impact statements with detailed remediation recommendations |
Bug Wizard Tier 2 | Awarded to security researchers who submit 30+ reports and provide clear impact statements with detailed remediation recommendations |
Bug Wizard Tier 3 | Awarded to security researchers who submit 40+ reports and provide clear impact statements with detailed remediation recommendations |