Creating Program Description & Scope

Learn how to create an effective program description and scope that attracts the right researchers

Disclaimer: This guide provides general recommendations for creating program descriptions and scopes based on industry observations. The content, including bounty ranges, vulnerability classifications, and legal terms, should be treated as reference points rather than definitive standards. Each organization should evaluate their specific security needs, industry regulations, legal requirements, and risk profiles when creating their program documentation. Bugbop does not guarantee any specific results or outcomes based on following these guidelines. We recommend consulting with security and legal professionals before finalizing your program terms.

Program Description

An effective program description is essential for setting clear expectations with Bug Hunters. A well-crafted description communicates your organization's commitment to security and helps researchers understand what you're looking for.

Elements of a Great Program Description

Your program description should include:

  • Welcoming introduction: Make researchers feel invited and valued
  • Brief company overview: Help researchers understand what your organization does
  • Security commitment: Express your dedication to security and vulnerability remediation
  • Researcher value: Explain how researcher contributions help your organization
  • Clear expectations: Set the tone for professional interactions

Example Introduction

"We're excited to invite security researchers from all backgrounds to help us make BugBop a more secure platform for everyone. Our commitment to security is a core value, and we believe that working with the security community is essential to maintaining the trust of our users."

Defining Scope

A well-defined scope helps researchers focus on the right assets and prevents misunderstandings about what's acceptable to test.

In-Scope Assets

Clearly define the systems and applications researchers are permitted to test:

  • Be specific about domains and subdomains
  • Include IP ranges if applicable
  • Specify mobile applications if they're included
  • List API endpoints if they're part of your scope
  • Include version information for testable software

Out-of-Scope Assets

Explicitly state what researchers should NOT test, such as:

  • Third-party services and providers
  • Physical locations and social engineering
  • Non-production environments (unless specified)
  • Legacy systems scheduled for retirement
  • Recently acquired systems not fully integrated
Important: Being explicit about out-of-scope assets prevents unnecessary testing and potential disruptions to your services or third-party relationships.

Example Scope Definition

In-Scope Assets:

  • Main Web Application: https://bugbop.com
  • Publicly Accessible Subdomains: *.bugbop.com
  • Mobile Applications: iOS and Android apps (latest release versions)
  • Public API: api.bugbop.com

Out-of-Scope Assets:

  • Any services hosted by third parties, unless they impact the security of our primary assets
  • Marketing pages (e.g., blog, landing pages)
  • Physical offices and social engineering
  • Third-party plugins that we use but do not develop

Vulnerability Types

Help researchers understand what types of vulnerabilities are valuable to your program and which ones aren't worth reporting.

In-Scope Vulnerabilities

List the types of vulnerabilities you're most interested in receiving:

  • Prioritize based on your technology stack and business risks
  • Consider including severity guidelines for each vulnerability type
  • Focus on vulnerabilities that present actual security risks

Out-of-Scope Vulnerabilities

Specify vulnerabilities that you don't want reported:

  • Low-impact issues that create noise in your program
  • Known issues that you've accepted the risk for
  • Theoretical vulnerabilities without practical exploit paths
  • Issues that require unlikely user interaction

Example Vulnerability Classification

Vulnerabilities We're Interested In:

  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Authentication bypass
  • Privilege escalation
  • Remote Code Execution (RCE)
  • Security misconfigurations
  • Server-side request forgery (SSRF)

Vulnerabilities Out-of-Scope:

  • Issues solely affecting outdated browsers
  • Missing HTTP security headers (unless they lead to a proven vulnerability)
  • Vulnerabilities requiring physical access
  • Self-XSS requiring significant user interaction
  • Reports from automated tools without clear evidence of impact
  • Theoretical vulnerabilities without proof of exploitation

Reward Structure

A clear reward structure helps researchers understand the value of different findings and incentivizes quality reports.

Setting Appropriate Rewards

Consider these factors when determining your reward structure:

  • Program budget: Align rewards with your available budget
  • Asset criticality: Offer higher rewards for critical systems
  • Vulnerability impact: Base rewards on potential damage
  • Industry standards: Research what similar programs offer

Example Reward Structure

We offer bounties based on the severity and impact of the vulnerability:

Critical: Full system compromise or large-scale breach

E.g. Remote Code Execution (RCE), database access

High: Access to sensitive data or elevated privileges without full compromise

E.g. Privilege escalation, significant data exposure, authentication bypass

Medium: Abuses that require some user interaction or unusual conditions

E.g. Cross-Site Scripting (XSS), CSRF, minor API issues

Low: Mostly informational or minor misconfigurations

E.g. Information disclosure without direct impact, missing security headers

Note: Reports without clear security implications or that require unrealistic attack scenarios will not be rewarded.

Suggested Bounty Ranges

The bounty amounts you offer directly impact the level of testing interest and researcher engagement your program will receive. Below is a guide to industry norms and what to expect at different reward tiers:

No Bounties, Disclosure Only

Bounty Ranges:
  • None - Thanks only
What to Expect:

Your existing users that find a security bug and decide to raise it. Beginners wishing to raise their reputation on platforms.

Note: By using Bugbop, the Bug Hunters can showcase their success via their public profile page which can be valuable despite no bounty being paid.

Entry Level Programs

Bounty Ranges:
  • Critical: $100-$500
  • High: $50-$350
  • Medium: $25-$200
  • Low: Thanks ($0)-$50
What to Expect:

Low to moderate testing interest, primarily from beginners and hobbyists. Best for small startups and initial programs.

Note: Even modest bounties significantly increase engagement, as they provide enough incentive for researchers to run automated tooling, conduct basic manual testing, and raise bug reports.

Growing Programs

Bounty Ranges:
  • Critical: $500-$2,000
  • High: $350-$1,400
  • Medium: $200-$800
  • Low: $50-$200
What to Expect:

Moderate testing interest from a mix of hobbyists and part-time researchers. Suitable for growing startups and medium-risk applications.

Established Programs

Bounty Ranges:
  • Critical: $2,000-$5,000
  • High: $1,400-$3,500
  • Medium: $800-$2,000
  • Low: $200-$600
What to Expect:

Substantial testing interest from experienced researchers and some full-time hunters. Ideal for established companies with high-value applications.

Premium Programs

Bounty Ranges:
  • Critical: $5,000-$15,000
  • High: $3,500-$10,000
  • Medium: $2,000-$6,000
  • Low: $600-$2,000
What to Expect:

High testing interest from professional researchers and security specialists. Appropriate for large enterprises, financial services, and healthcare organizations.

Elite Programs

Bounty Ranges:
  • Critical: $15,000+
  • High: $10,000+
  • Medium: $6,000+
  • Low: $2,000+
What to Expect:

Very high testing interest from elite researchers and specialized security teams. Suitable for critical infrastructure and major tech companies.

Note: These ranges reflect industry averages across all severity levels. Actual bounties should be tailored to your organization's specific security needs, risk profile, and budget.

Consider additional rewards for exceptional reports, such as clear documentation, creative exploit chains, or suggestions for effective mitigations.

Submission Guidelines

Clear submission guidelines help researchers provide the information you need to validate and fix vulnerabilities efficiently.

What to Include

Request that researchers include these elements in their reports:

  • Detailed reproduction steps: Clear, step-by-step instructions
  • Impact description: How the vulnerability could affect your system or users
  • Supporting evidence: Screenshots, videos, or code snippets
  • Suggested fix: Potential solutions (optional but appreciated)
  • Attack scenario: Real-world exploitation examples

Testing Rate Limits

To ensure the stability of your systems and prevent unintended disruptions, include clear rate limit guidelines:

  • API requests: Maximum number of requests per minute/hour
  • Authentication attempts: Limits on login/signup attempts
  • Email/SMS triggers: Restrictions on actions that generate notifications
  • Form submissions: Limits on submission frequency
  • Resource-intensive operations: Guidelines for testing heavy operations

Updating Program Scope and Bounties

As your program matures, you may need to update your scope or bounty structure. Here are some best practices for making these changes:

When to Update Your Program

  • Scope expansion: When adding new products, services, or domains to your organization
  • Scope reduction: When retiring systems or moving assets out of scope
  • Clarity: If a class of bug is repeatedly closed as "Won't fix" or "N/A", be more explicit in your scope to exclude it
  • Bounty increases: When you have budget available and want to attract more researchers
  • Focusing research: When you want to direct attention to specific parts of your application

Subscribers of your program will receive a notification that your program scope has been updated with an AI summary of your changes.

When decreasing bounties or removing scope, honor the previous terms for any findings that were already in progress.

Template

Below is a comprehensive template for your program description and scope document. Feel free to customize it to fit your specific needs.

[YOUR ORGANIZATION NAME] Bug Bounty Program

Welcome

We're excited to invite security researchers from all backgrounds to help us make [YOUR ORGANIZATION NAME] a more secure platform for everyone. Your expertise helps us identify vulnerabilities before they can be exploited, and we value your contributions to our security efforts.

Program Scope

We appreciate reports that can help us improve our security posture. Please review the following details carefully before submitting your findings.


In-Scope Assets
  • Main Web Application: https://YOURTESTED_DOMAIN.COM
  • Publicly Accessible Subdomains: *.YOURTESTED_DOMAIN.COM
  • Mobile Applications: [LINKS TO YOUR MOBILE APPS]
  • APIs: [LIST YOUR APIS AND LINK TO DOCUMENTATION]

Out-of-Scope Assets
  • Any services hosted by third parties, unless they impact the security of our primary assets.
  • Marketing pages (e.g., blog, landing pages).
  • Physical offices and infrastructure.
  • Employee social media accounts.

Vulnerabilities We're Interested In
  • Cross-Site Scripting (XSS)
  • SQL Injection
  • Authentication bypass
  • Privilege escalation
  • Misconfigured access controls
  • Remote Code Execution (RCE)
  • Security misconfigurations
  • Server-side request forgery (SSRF)
  • [LIST ANY OTHER TYPE OF VULNERABILITIES]

Vulnerabilities Out-of-Scope
  • Issues solely affecting outdated browsers
  • Missing HTTP security headers (unless they lead to a proven vulnerability)
  • Vulnerabilities requiring physical access
  • Self-XSS requiring significant user interaction
  • Reports from automated tools without clear evidence of impact
  • Theoretical vulnerabilities without proof of exploitation

Rewards

We offer bounties based on the severity and impact of the vulnerability:

  • Critical: Full system compromise or large-scale breach
    E.g. Remote Code Execution (RCE), database access, admin panel access
  • High: Access to sensitive data or elevated privileges without full compromise
    E.g. Privilege escalation, significant data exposure, authentication bypass
  • Medium: Abuses that require some user interaction or unusual conditions
    E.g.: Cross-Site Scripting (XSS), CSRF, minor API issues
  • Low: Minor misconfigurations or information disclosure
    E.g.: Information disclosure without direct impact, missing security headers

Note: Reports without clear security implications or that require unrealistic attack scenarios will not be rewarded.

Submission Guidelines

  • Provide clear, step-by-step instructions to reproduce the vulnerability
  • Include screenshots, videos, or code snippets where possible
  • Test only on your own accounts; do not access others' data
  • Describe the potential impact and attack scenario
  • Be respectful of our users' privacy and our systems' stability

Rate Limits & Testing Constraints

  • Limit requests to no more than 10 requests per minute
  • Avoid testing that triggers excessive emails or notifications (max 5 per hour)
  • Limit login/authentication attempts to 10 per hour
  • Avoid any testing that could impact system availability or other users

Our Commitment

  • We will acknowledge your report within [AMOUNT OF TIME] hours/business days
  • A resolution or update will be provided within [AMOUNT OF TIME] business days
  • We will keep you informed about the status of your report
  • We will recognize your contribution if you wish to be acknowledged

Legal Safe Harbor

This program follows a "safe harbor" approach. As long as your research is conducted responsibly and within the program's scope, we consider it authorized. If legal questions arise, we'll work with you to understand and resolve them.

Need help with your Program scope?

Our security experts can guide you through creating an effective bug bounty program tailored to your organization's needs.