Bounty
Borderless will pay bounties for ethically reported vulnerabilities that were previously unidentified by Borderless.
Bounties for verified security vulnerabilities reported by third party ethical security researchers.
Borderless will pay bounties for ethically reported vulnerabilities that were previously unidentified by Borderless.
The submission of reports implies acceptance of the terms of this program.
Payment will be made through the Borderless AI platform.
Rewards by severity of issue (determined by Borderless AI)
All amounts in USD
While Borderless has throttling in place, the limits are intentionally different between the Test and Production environments. It is generally not useful to test throttling in the Test environment without knowing the exact throttle thresholds for that specific environment, which Borderless does not disclose.
Please review each step
Please review each warning
The program is intended exclusively to enable third party researchers to submit critical vulnerabilities, such as missing authentication on endpoints, or similarly critical issues.
1-2 line description of the issue
- Description of vulnerability
- Detailed steps to reproduce the vulnerability
- Description of impact
Proof of concept demonstrating the vulnerability, using the test environment.
This should include a screen recording, or a screenshot, showing information disclosure or corruption.
Name:
Email:
Address: