Security Research Challenge

Part bug bounty, part capture-the-flag

This isn't your typical bug bounty. We've built something for researchers who appreciate the craft. Real vulnerabilities earn real rewards. There's also an Easter egg for those who understand the history of authentication security. No scanners. No spray-and-pray. Just you, the API, and your knowledge.

Rewards

Scope

Rules of Engagement

Out of Scope

How It Works

Safe Harbor

We consider security research conducted in accordance with this policy to be authorized, lawful, and helpful. We will not pursue legal action against researchers who act in good faith and follow these rules. If legal action is initiated by a third party, we will take steps to make it known that your actions were conducted in compliance with this policy.

Contact

Email: [email protected]
Response time: 48 hours

WordPress, done right.

€15/year. Not a typo.

For developers, agencies, and creators who refuse to overpay.

Get Started

Cancel anytime · 14-day money-back guarantee