Client: Auto-man Driving School
Contact: Deanna "Dee" Bath
Platform: Web (vibecoded)
For a while, we've been looking for someone to run a bug bounty on a vibecoded app. It's widely reported that these apps have security issues (mass scan, Tea breach, Lovable, GT study). Security of these apps is consistently pushed to the 'later' backlog along with the rewrite. The program found some bugs (but nothing hilarious and/or catastrophic - sorry to disappoint). The main story here is about getting a meaningful pentest based on constraints.
Auto-man Driving School's developer, Deanna "Dee" Bath, is a business analyst and freelance developer who builds web applications using AI-enabled development. She started programming in 1997 with VB6, moved into Business Analyst roles in 2008, and returned to development in March 2025 using AI-assisted tools. She isn't a security specialist, but she knows that shipping software to real clients means security matters.
The project is a booking system for driving lessons. The app is a static frontend hosted on GitHub Pages with Supabase providing authentication, database, and backend services. It's a client-facing platform with user authentication, calendaring, messaging, and an admin portal.
Dee was set up with a small program with a little assistance from the Bugbop team:
This setup meant Dee could focus on fixing issues rather than figuring out what to do about them. The reports were educational enough that she came away with a better understanding of web security in general.
"Program setup assistance was excellent. The example email was a great touch and helped me understand what testers would receive."
Deanna "Dee" Bath, Freelance Developer
| Severity | Issue | Bounty |
|---|---|---|
| High | Stored XSS and Cross-Account Message Injection via Contact Form | $100* |
| Medium | Unauthorized Booking Cancellation (IDOR) | $40** |
| Medium | Old Sessions Not Expired After Password Change | $20 |
| Low | Missing DMARC DNS Record (found by Bugbot) | N/A |
| Low | Missing Content-Security-Policy Header (found by Bugbot) - not fixable on hosted platform | N/A |
| Low | Missing Clickjacking Protection (found by Bugbot) - not fixable on hosted platform | N/A |
* Paid above typical Medium severity rate due to report quality and impact
** $20 bounty + $20 bonus for initiative and enthusiasm
"Bugbot found 3 issues before official testing even began. Bugbot automatically retested when I marked an issue as Fixed, which is a smart safeguard against closing something too early."
Deanna "Dee" Bath, Freelance Developer
Bugbop's flexible pricing allowed Dee to reward quality and initiative. The $100 bounty for the XSS+injection issue exceeded typical Medium rates because the report quality and business impact justified it. For the final finding, Dee was about to close testing - but the tester's enthusiasm convinced her to extend the window. She paid $20 for the vulnerability plus a $20 discretionary bonus specifically "for showing initiative."
Once satisfied that key issues were found and resolved, Bugbop refunded the remaining wallet balance (from the initial $575 deposit). This meant she only paid for bounties actually awarded (and the 15% platform fee).
Before choosing Bugbop, Dee considered the alternatives available for security testing a small vibecoded app. Here's how they stacked up:
"Good reports do more than find bugs. They help you learn. For any small business owner or developer who thinks security testing is only for large companies, my experience says otherwise."
Deanna "Dee" Bath, Freelance Developer
If you're a freelancer or vibecoder shipping apps to real clients, Bugbop makes it easy to fix security issues even if you're not a security expert.