Security vulnerability reward program
Komoot rewards the effort of security researchers who help us to make our platform more secure. We offer rewards for finding security vulnerabilities in our website, mobile applications and backend infrastructure.
How to submit your report
Please submit your PGP encrypted report via email to security@komoot.com. Use our public PGP key to encrypt your report. Only encrypted reports with [BUG BOUNTY] in the email subject will be considered.
Eligible for bounty rewards
We reward submissions of vulnerabilities for the following systems:
Out of scope for bug bounties are currently
Only vulnerabilities that haven’t been disclosed to the public before we fixed the bug are eligible for a reward.
Do not subject our APIs or websites to denial-of-service attacks, scraping, brute force, or other types of automated attacks. Do not try to get access to data of real customers. Use your own test accounts for a proof-of-concept.
Our bounty rewards and response SLAs
Our rewards are based on severity per CVSS v3.1 Ratings. In the event of duplicate reports, we award a bounty to the first person to submit an issue. For a critical severity you additionally need to demonstrate that your attack could compromise the confidentiality or integrity of all komoot users without any user interaction needed.
We aim at an initial response time of 7 days. You should expect a payment for confirmed vulnerabilities within four weeks.
Photo by Tobias