1. Objective
The Bug Bounty Program aims to enhance the security of our services and the Survicate tool by incentivizing security researchers and ethical hackers to report potential security vulnerabilities responsibly, improving the security for all users by eliminating vulnerabilities.
This Program is competitive in nature. Submissions are assessed against each other for quality, impact and usefulness, and only selected submissions may receive a monetary reward. Participation or submission of a report does not guarantee a reward.
2. Requirements
-
Participants must not publicly disclose the reported vulnerability.
-
You must be at least 18 years old and possess full legal capacity.
-
Current or former employees of Survicate (or families of those) are excluded.
-
You must abide by all relevant legal and ethical guidelines.
-
Reports must be made in good faith and must not involve any malicious intent; refrain from any actions that may be considered invasive.
-
Efforts to gather information about vulnerabilities are not rewarded, meaning that simply dedicating time without delivering tangible results is not sufficient for recognition.
-
You must not be an individual from countries subject to sanctions by the Republic of Poland, Great Britain, the European Union, the United States, or Australia.
-
Participants are responsible for providing all necessary tools and resources. Participation in the Program is entirely at your own cost and risk.
3. Scope of the Program
-
The Survicate Bug Bounty Program covers all online services and applications provided by Survicate SA,
-
in-scope hosts:
-
panel.survicate.com
-
panel-api.survicate.com
-
survey.survicate.com
-
surveys-static.survicate.com
-
surveys-static-prd.survicate-cdn.com
-
respondent.survicate.com
-
-
in-scope apps:
-
iOS SDK
-
Android SDK
-
React Native SDK
-
Flutter SDK
-
JavaScript SDK
-
Panel - panel.survicate.com
-
Data Export API v2 only
-
Webhooks
-
-
-
Third‑party integrations and external services not directly controlled by Survicate are excluded from the Program.
Any domains and endpoints not listed in the targets section are out of scope.
4. Out of Scope
Vulnerabilities in the following areas are out of scope and will not be eligible for Rewards:
-
Vulnerabilities in third-party applications or libraries that are not developed by Survicate.
-
Exploitation of known vulnerabilities that depend on outdated user software, such as outdated browsers or operating systems.
-
Attacks such as Distributed Denial of Service (DDoS).
-
Vulnerabilities related to third-party APIs.
-
Brute-force attacks to uncover credentials.
-
Issues involving social engineering, phishing, or other tactics unrelated to the technical security of Survicate's systems.
-
Issues with DNS records (SPF, DKIM, DMARC) or SSL/TLS certificate configuration.
-
Low-severity vulnerabilities such as content spoofing or OWASP Low category issues.
-
Cross-Site Request Forgery (CSRF) vulnerabilities on non-sensitive areas of the platform.
-
Discovery of publicly available information that does not pose a security threat.
-
Security issues stemming from misconfigured external services or infrastructure not directly controlled by Survicate.
-
Enumeration of accounts and other resources.
-
E-mail flooding/bombing.
-
Vulnerabilities that have been independently detected by Survicate or reported as part of other report submissions of the same or similar nature. Similarity means the use of the same or a similar methodology or pattern, or if the mitigation measures previously applied or planned by Survicate (in the context of other vulnerabilities) will also secure the reported vulnerability.
-
Circumventing business plan limits defined in Survicate's pricing and using features without paying for them, including paywall bypass attacks.
5. Reporting Procedure
-
Vulnerabilities must be reported via email to bugbounty@survicate.com.
-
Reports should include
-
detailed information about the Vulnerability,
-
steps to reproduce the issue, and
-
potential security impact.
-
-
Survicate may request additional information or proof of concept.
-
Survicate will respond to the reporter within 30 business days.
6. Rewards
-
Rewards will be determined by Survicate based on the severity of the vulnerability and its impact on the security of Survicate systems. Rewards are denominated in USD and payable in USD only.
-
Critical: up to USD 1,300
-
High: up to USD 550
-
Medium: up to USD 250
-
Low: up to USD 25
-
Amounts are determined based on the 'CVSS Methodology' as an individual assessment in specific cases; Survicate uses CVSS but reserves the right to make an individual assessment.
-
You will receive a Reward if you are the first to report the specific vulnerability. If the vulnerability has already been reported by someone else who received a reward, no additional Reward will be granted.
-
The Reward pool is limited and, due to the competitive nature of the Program, only selected submissions may receive a reward.