This website uses information gathering tools including cookies, and other similar technology. We use these tools to personalize content and ads, to analyze our website traffic, and to provide better website experience. We also share information about your use of our site with advertising and analytics partners. By selecting “Accept” you are providing your consent to our use of cookies and other similar technology in this way. You can withdraw your consent at any time by clicking on “Your Privacy Choices” in the website footer and changing your preferences. For more information, see our Privacy Policy.
Porkbun wants to stamp out any bugs we haven't yet found, and we need the help of the security community to do it. If you find a security vulnerability on Porkbun, we want to hear about it, ASAP.
BE PATIENT: We will assess and process your submission as quickly as possible. Depending on the nature of the vulnerability and available development time it may take up to 30 days for us to fix it and make payment to you.
Porkbun has adopted Bugcrowd’s Vulnerability Rating Taxonomy (VRT) for the purpose of prioritizing and paying out on reported bugs. We currently payout for P1 through P4 vulnerabilities.
| Priority | Additional Info | Bounty |
|---|---|---|
| P1 | $750 | |
| P2 | $500 | |
| P3 | $250 | |
| P4 | $0 - $100 | |
| Other | Please note, while we appreciate the submission we currently cannot payout on low priority vulnerabilities. We would be happy to comment on or recommend you via a recognized bug bounty / security website however. | $0 |
| Vulnerability | Explanation |
|---|---|
| Self-XSS | Self-XSS and issues exploitable only through Self-XSS. |
| Error Messages | Descriptive error messages such as stack traces, application or server errors, HTTP error pages, etc. |
| CSRF Required | Issues exploitable by requiring a valid CSRF token. |
| Clickjacking | Clickjacking and issues only exploitable through clickjacking. |
| Already Known | Issues previously submitted, already known internally or publicly, etc. |
| Public CSRF | CSRF on forms and actions that are available to anonymous users such as search, contact form, cart actions, etc. |
| CSRF Cookie | The CSRF token cookie is not http only. We know this and it is by design. |
| Out of Scope | Issues not directly related to the porkbun.com website. This includes subdomains, email spoofing, spf/dmarc/dkim configuration, etc. |
You must submit all required information in order for your submission to be accepted.
You've opted out of support chat.
Your account information will be shared with HelpScout and our AI assistant to provide support. See our Privacy Policy.