Bright Security
  • STAR
  • Business Impact
  • Platform
  • Resources
  • Partners
  • Company
Book a Demo

Bug Bounty Program

If you believe you have found a security issue or vulnerability, please submit the report to our security team by following the guidelines below

Updated December 12, 2021

Scope

If you believe you have found a security issue or vulnerability, please submit the report to our security team by following the guidelines below

In-Scope Targets

https://brightsec.com/

https://app.brightsec.com

https://eu.brightsec.com

Testing is only authorized on the targets listed as In-Scope. Any domain/property of Bright Security not listed in the targets section is out of scope. This includes any/all subdomains not listed above.

This program excludes (regardless of coverage indicated above):

  • Clickjacking
  • External SSRF
  • Anything related to Mail Server Domain Misconfiguration (including email spoofing, missing DMARC, SPF/DKIM, etc.)
  • Brute Force attacks on our Login or Forgot Password pages
  • Account lockout enforcement
  • Internal IP address disclosure
  • Username / Email Enumeration
  • No Captcha / Weak Captcha / Captcha Bypass
  • Missing HTTP security headers
  • Cookie Issues
  • ​​SSL Issues
  • Weak password policies (length, complexity, etc.)
  • Vulnerabilities primarily caused by browser/plugin defects and not representative of defects in the security of Bright Security’s platform
  • Vulnerabilities that require social engineering
  • WordPress “issues” such as xmlrpc that are mitigated by our hosting provider
  • Out-of-date browsers and plugins
  • Vulnerabilities in 3rd party applications that do not directly affect our data or service
  • Spam of any kind
  • Denial of service attacks
  • Issues already known by us or previously reported to us by others
  • Issues that we have determined to be of acceptable risk

Submissions containing issues related to the above list of exclusions will not be eligible for reward. If you have found a vulnerability that is excluded by our program, you may still report it as part of our vulnerability disclosure program.

Act responsibly

The rules of responsible disclosure of vulnerabilities include, but are not limited to:

  • Avoid accessing, exploiting, or exposing any customer data other than your own.
  • Avoid any action that may cause a degradation of our services
  • Do not use any social engineering techniques
  • When methods are used that do not comply with your local law and/or the above-mentioned responsibility rules, enforcement authorities will be notified

Reproducibility

Our security team and engineers must be able to reproduce the reported security flaw. Make sure your report is clearly written and includes all the necessary information so we can reproduce the flaw. Please include:

  • Type of vulnerability
  • When applicable, include the URL
  • The potential impact of the vulnerability
  • Step-by-step instructions to reproduce the issue, including any proof-of-concept or exploit code to reproduce
  • Screenshots and/or videos illustrating the vulnerability

Definition of a Vulnerability

To be eligible for a reward, your finding must be considered valid by the Bright Security security team.

Reward

We base all payouts on impact and will reward accordingly. Please emphasize the impact as part of your submission.

We are particularly interested in:

  • Major exposures around customer data leak
  • Issues that result in full compromise of a system
  • Business logic bypasses resulting in significant impact
  • Major operational failure (excluding Denial of Service related submissions)

Keep in mind:

  • Only one bounty will be awarded per vulnerability
  • If we receive multiple reports for the same vulnerability, only the person offering the first clear report will receive a reward.
  • Our reward system is flexible. We have no minimum or maximum amounts as rewards are based on severity, impact, and report quality.
  • Vulnerabilities affecting our platform or platform-related plugins typically have a higher impact.

Reporting

You can contact us via bugbounty@brightsec.com to report any vulnerability or if you have questions about this program. bugbounty@brightsec.com to report any vulnerability or if you have questions about this program.

Disclosure Policy

Bright Security understands the importance of disclosure of vulnerabilities and we are happy to allow disclosure in certain instances.

Rules

  • ​​You must receive explicit permission from Bright Security if you would like to disclose any finding or vulnerability. This includes any findings listed on the program exclusion list above.
  • You may not discuss any vulnerabilities with anyone or on any forum outside of Bright Security’s bug bounty program, unless getting permission from Bright Security.
  • Reports that are not considered valid vulnerabilities (Informative, Spam, etc) are not eligible for disclosure.
  • Only resolved reports are eligible for disclosure.
  • The request for disclosure must be made by the bug bounty hunter who originally reported the vulnerability to Bright Security.
  • Duplicate reports are not eligible for disclosure.

Requesting Permission

To request permission for disclosure, you may email bugbounty@brightsec.com Bright Security has the right to approve or deny the request for any reason. bugbounty@brightsec.com.
Bright Security has the right to approve or deny the request for any reason.

Violation of Terms

By participating in Bright Security's bug bounty program, you are agreeing to this policy. If any of the rules of this disclosure policy are broken, Bright Security has the right to legal action against the person who violated the rules.

If any of the rules of this disclosure policy are broken, Bright Security has the right to legal action against the person who violated the rules. That person will also be banned from all future participation in the Bright Security bug bounty program.

Schedule a call with Bright expert!

With a new age on LLM and Gen AI powered applications here on our doorstep

Book a Demo
Cyber Essentials Cyber Essentials ISO 9001 AICPA SOC Fortinet ISO 27701 GDPR
G2 High Performer G2 High Performer G2 High Performer G2 High Performer G2 High Performer Enterprise G2 High Performer

Platform

  • Integrations
  • Bright Copilot
  • Dynamic AppSec

Resources

  • Blog
  • Doc

Company

  • About us
  • Contact Us
  • Case Studies
  • Careers
  • Bug Bounty Program

Partners

  • Our Partners
  • Become a partner

Get our newsletter

Please enable JavaScript in your browser to complete this form.
Checkboxes *
Loading

Bright All rights reserved © Bright Security 2026
✦ Terms of service ✦ Privacy policy ✦ Cookies policy

Overview

STAR Page
The next-generation platform for DAST, IAST, and API security testing, with automated remediation to fix vulnerabilities instantly
▶

Solutions

Explore solutions for modern AppSec: Shift-Left security, API penetration testing, and integrating dynamic testing into your CI/CD.

+
AI-Driven Discovery & Attack Surface Mapping

Automatically map your app’s full structure, dependencies, and hidden or shadow APIs, giving you complete attack-surface visibility in minutes

▶
Function-Level Vulnerability Detection

Detect real, exploitable flaws by analyzing code at the function and endpoint level. Coverage includes OWASP Top 10, API Top 10, & LLM Top 10.

▶
AI-Powered Remediation & Validation Loop

STAR generates fixed suggestions, tests them automatically, and validates the results, instantly closing the loop and cutting remediation time by 50%.

▶
Secure Pull Request (PR) Automation

Automatically scan every PR in GitHub or GitLab. STAR flags insecure merges early, adds verified fixes, and keeps your development moving fast—safely.

▶

Comparison pages

Compare Bright STAR with leading AppSec platforms and understand the technical differences across accuracy, speed, validation, and remediation workflows

+
Bright vs Snyk

A technical comparison of Bright STAR and Snyk, focused on runtime validation, false positive reduction, and CI/CD-native security testing.

▶
Bright vs Checkmarx

See how Bright STAR differs from Checkmarx in dynamic testing depth, real exploit validation, and faster time-to-remediation.

▶
Bright vs Hcl

An overview of how Bright STAR compares to HCL AppScan across automation, scan accuracy, and modern API-first security coverage.

▶
Bright vs Invicti

Deeper dynamic testing, real exploit validation, faster remediation.

▶
  • Rapid AI Compliance & Easy Deployment

    Achieve compliance (OWASP Top 10, PCI DSS, etc.) quickly with AI-driven testing and deploy the platform in minutes, not weeks.

    ▶
  • Empowering Developers: Faster, More Secure Code

    Get immediate, accurate feedback within the developer's workflow (IDE/PRs) to ensure code is secure before it reaches production.

    ▶
  • Eliminate Security Tech Debt

    Automatically fix security vulnerabilities in code with remediation suggestions, eliminating false positives and reducing backlogs.

    ▶
  • Secure Shadow APIs & Undocumented Endpoints

    Automatically discover and test all public and internal APIs, including undocumented "Shadow" endpoints, to ensure full coverage.

    ▶

Overview

  • Dynamic Application Security Testing

    Dynamic AppSec platform that secures web applications, APIs, business logic, and LLMs, accelerating vulnerability resolution by up to 10X

    ▶
  • Integrations

    Explore native integrations with your CI/CD, IDEs (VS Code, IntelliJ), ticketing (Jira), and source code management (GitHub, GitLab).

    ▶
  • Book a Demo

    ▶

Resources

  • Blog

    See how dev-centric DAST for the enterprise secures your business.

    ▶
  • Docs

    See how dev-centric DAST for the enterprise secures your business.

    ▶

 

  • Case Studies

    ▶
  • About us

    Who we are, where we came from, and our Bright vision for the future.

    ▶
  • News

    Bright news hot off the press.

    ▶
  • Contact us

    Need some help getting started? Looking to collaborate? Talk to us.

    ▶
  • Careers

    Want to join the Bright team? See our open positions.

    ▶
  • Bug Bounty

    Found a security issue or vulnerability we should hear about? Let us know!

    ▶