We know how much work goes in to pen testing! To avoid frustration, you can check out these common non-vulnerabilities that don't qualify for rewards.
Got a valid issue? Awesome! Please include:
If you plan to provide access tokens, secure cookies or sensitive data as an example, we kindly ask you GPG encrypt your email. Here is our public GPG key.
We're eternally grateful for all of those who put in hard work to identify weaknesses within Buffer. For reports that are not common non-vulnerabilities, we like to reward those who responsibly disclose vulnerabilities with an acknowledgement, swag or bounty money.
We appreciate the work that goes into finding and disclosing security flaws in Buffer and would like to thank the following individuals and organizations:
We've been working closely with Egor and his team at Sakurity to identify key weaknesses within our app. They've continuously proven to be experts in identifying OAuth weaknesses. They have helped us identify and resolve potential security holes such as account hijacking, access token leaks, XSS and CSRF exploits.