We review each report to determine whether the issue reported is a valid security or privacy issue, and if so, whether it qualifies for a reward. All security issues with significant impact to users will be considered for the Brilliant Directories Security Bounty.
Brilliant Directories Security Bounty reward payments are based on:
- The type of vulnerability, which can include the user interaction required, number of affected users, level of access, and other factors.
- The quality of your research report, which helps our team understand, reproduce, and address the issue more quickly.
Maximum bounty amounts require high-quality reports and are meant to reflect significant scope and effort. Vulnerabilities that have a greater impact on users tend to receive larger bounty reward payments — for example, issues that affect most or all of the Brilliant Directories platform or services, or circumvent advanced security protections.
Other factors may include the number of users affected; the user interaction that’s required or whether the user is notified; the level of access or execution achieved; and the persistence of the issue. For example, a “zero-click” exploit — where an attacker would be able to gain access to a user’s data without any interaction from the user — would be eligible for a significantly larger bounty than an issue that requires physical access to a user’s device.
To increase your potential reward, make sure your report is detailed and thorough. Reports with only a basic proof of concept tend to receive about half the typical reward, and those without a working proof of concept typically receive even less. If your report doesn’t indicate how to reproduce the issue, it may not qualify for a bounty. A report for a bounty-eligible issue with a clear scenario that clearly demonstrates the issue is more likely to receive a top reward than a report for the same issue without supporting details.