PoliciesBug Bounty Program

Bug Bounty Program

Our security vulnerability reporting program and rewards

At Appbox, security is a fundamental priority. We actively encourage security researchers to help strengthen our platform by identifying and reporting potential vulnerabilities. This program outlines our approach to responsible security research, how we handle vulnerability reports, and the rewards we offer to researchers who help improve our security posture.

Our Commitment

When you participate in our bug bounty program, we promise to:

  • Acknowledge and evaluate your report in a timely manner
  • Address confirmed vulnerabilities with appropriate urgency
  • Recognize and reward you for unique, previously unreported vulnerabilities that lead to security improvements

Program Coverage

This bug bounty program applies to the following Appbox platforms:

Excluded Areas and Issues

The following are considered outside the scope of our bug bounty program:

  • WHMCS Client Area [https://billing.appbox.co] - Vulnerabilities should be reported directly to WHMCS through their own security program
  • Security issues that don't affect our default application configurations
  • Vulnerabilities in our containers that require non-standard configurations
  • Timing-based information disclosure attacks
  • Process enumeration techniques
  • Any form of denial of service or high-volume attacks
  • Social engineering and phishing techniques
  • Automated security scanning that generates excessive traffic or loads

Reward Structure

Main Website and Control Panel

Vulnerability TypePayPal RewardService Credit
XSSEUR 100EUR 200
XSS (CSP Bypass)EUR 200EUR 300
CSRFEUR 300EUR 450
Authentication BypassEUR 500EUR 750
SQL InjectionEUR 1000EUR 1500
Arbitrary code executionEUR 1000EUR 1500
Arbitrary code execution (with privilege escalation)EUR 2000EUR 3000
Persistent code changeEUR 1000EUR 1500

Hosting Infrastructure

Vulnerability TypePayPal RewardService Credit
Authentication Bypass (SSH, FTP, VPN, etc.)EUR 500EUR 750
Authentication Bypass for Supported AppsEUR 100EUR 200
Local privilege escalationEUR 500EUR 750

Contributors who report valid vulnerabilities will be recognized in our Security Researchers Hall of Fame as a token of our appreciation.

Claiming Your Reward

  • You may choose between two reward options:
    • Direct PayPal payment (requires a valid PayPal account)
    • Appbox service credits (applicable to any Appbox service, non-transferable)

Participation Guidelines

  • Adhere to this policy, our Terms of Service, and all applicable laws
  • Report vulnerabilities promptly after discovery
  • Respect user privacy and system integrity during your research
  • Submit all vulnerability reports exclusively through our Support Ticket System
  • Maintain confidentiality about discovered vulnerabilities until resolved
  • Limit your testing to systems explicitly included in this program
  • If you gain unexpected access to sensitive data: access only the minimum amount needed to demonstrate the issue, stop testing immediately, and report the vulnerability promptly
  • Use only your own test accounts for any interaction with our systems
  • Never attempt to extort Appbox based on your findings

Security researchers following this policy can expect:

  • Protection from legal action for good-faith security research conducted within these guidelines
  • Exemption from anti-circumvention legal claims when necessary for legitimate security research
  • Waiver of certain policy restrictions that would otherwise prevent security testing
  • Recognition that compliant security research is beneficial and conducted in good faith

You remain responsible for complying with all applicable laws. If you face legal action from a third party while adhering to this policy, we will affirm that your actions were conducted in compliance with our program. If you're uncertain about whether your planned research activities comply with this policy, please contact us through the Support Ticket System before proceeding.

Reporting Process

To report a vulnerability, create a detailed ticket through our Support Ticket System.

  • Your report should include comprehensive steps to reproduce the vulnerability. You may use this template as a guide: https://github.com/ZephrFish/BugBountyTemplates/blob/master/Example.md
  • All program communications must go through our official Support Ticket Platform
  • Public disclosure of any vulnerability without explicit written permission from Appbox violates this program's terms and will disqualify you from receiving a reward