Hello there! Interested in joining our Cyber Food Program? Here’s your chance to bring vulnerabilities to our table! Let the challenge begin!
We’re excited to welcome you to the FoodReady bug bounty program! Your participation means a lot to us.
Our mission is to raise the bar for security; we view this as a collaborative effort. The FoodReady platform is trusted by thousands of companies globally, and we pride ourselves on promoting safety and quality. We need innovative thinkers—researchers who can step beyond conventional boundaries to uncover security issues.
If you come across something that could lead to an exploit or if you need insights into our systems to assist in your investigation, feel free to make a submission and ask for the information you need. We also welcome hypothesis-driven submissions without penalties and will collaborate with you to explore the possibility of turning those ideas into a fully realized exploit, if feasible.
This program focuses exclusively on the web applications and apps listed in this document. Check the scope outlined below.
All bounty submissions are rated by FoodReady using a simple scale. Each vulnerability is unique, and the following is a rough guideline we use internally for rating and rewarding submissions:
Critical severity issues present a direct and immediate risk to a broad array of our users or to a FoodReady product itself. They often affect relatively low-level/foundational components in one of our application stacks or infrastructure. For example:
The upper bound for critical vulnerabilities, $500, is only a guideline, and FoodReady may reward higher amounts for exceptional reports.
To qualify for a reward under this program, you should:
FoodReady considers cybersecurity a fundamental part of our business and products. While this summary outlines our multifaceted security approach, we have extensive controls and measures beyond what is covered here. For further details or questions about our support, security, or privacy practices, please submit the “Contact Us” form.
In addition to our scope, we want to share a high-level overview of FoodReady’s services:
Your research is covered by the GitHub Bug Bounty Program Legal Safe Harbor policy. In summary:
This is our domain for hosting static assetOur security and development teams take many factors into account when determining a reward. These factors include the complexity of successfully exploiting the vulnerability, the potential exposure, as well as the percentage of impacted users and systems. Sometimes an otherwise critical vulnerability has a very low impact simply because it is mitigated by some other component, e.g., it requires user interaction, it relies on an obscure web browser, or it would need to be combined with another vulnerability that does not currently exist. Our teams use our documented severity guidelines to determine the bounty reward amounts rather than correlating with CVSS ratings. Additionally, at least two FoodReady security engineers agree on the severity and amount before a payout is made.s. All subdomains under FoodReady.ai are in-scope.
You can certainly attach a video if you believe it will clarify your submission. However, all submissions must also include step-by-step instructions to reproduce the bug. The security team will let you know if we think a video will clarify your report. Submissions which only include video reproduction steps will have a longer response time and we may close your submission as Not Applicable.
You may get a response that appears to be from a bot. The bot does some work for us, but only when we tell it to. We “do our own stunts” at FoodReady Security. An application security engineer at FoodReady triages each submission. In most cases, we use the bot to automate messaging and other tasks for us. Rest assured, a human did look at your submission.
FoodReady’s Bug Bounty program is designed to both reward individual researchers and increase the security of all FoodReady users. We don’t believe that disclosing FoodReady vulnerabilities to third parties achieves either of those goals. As a result, any vulnerabilities that are disclosed to third-party before being submitted to our program are ineligible for rewards.
We do not always update HackerOne with the assessed severity because we track that information internally. Our payout guidelines and the value of the reward dictate our assessment of severity, not the severity on HackerOne.
If you absolutely believe encrypting the message is necessary, please read our instructions and caveats for PGP submissions.
As noted in the performing your research section, denial of service research is best done on your own instance of GHES. Causing an availability issue is simply not helpful. We are only interested in denial of service issues at the application layer (logic bombs, ReDoS, etc.). Volumetric attack submissions are not eligible for rewards and we may suspend your FoodReady account or temporarily ban your IP address.
We’re stoked to hear you’d like to become a Hacktocat! In order to be eligible to receive an invitation, you must earn at least $20,000 in our program and have submitted at least 2 reports over the last 2 years. Please note that meeting this criteria does not guarantee an invitation. We reserve the right to extend invitations at our discretion. We review eligibility and make decisions on candidates on a quarterly basis.
Our VIP Hacktocats gain access to a Slack channel with Hubbers, exclusive Hacktocat swag, access to beta features, and more!