
BILL VDP
External Program
Submit bugs directly to this organization
Welcome to our Vulnerability Disclosure Program! We take security seriously at BILL and are deeply appreciative of the role that security researchers play in improving the security posture of our product and platform. Please review the program details below to learn how you can play a role in keeping BILL safe and secure for our customers. We appreciate your participation!
Open Scope — Accepts reports for all owned assets based on impact, even if not listed in scope.
Gold Standard Safe Harbor — Adheres to Gold Standard Safe Harbor.
Coordinated Vulnerability Disclosure — Undeclared
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, it may not be accepted.
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
When duplicates occur, we only triage the first report that was received (provided that it can be fully reproduced).
Multiple vulnerabilities caused by one underlying issue will be treated as one valid report.
Social engineering (e.g. phishing, vishing, smishing) is prohibited.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
In order to help us identify and validate security researcher activity, please do the following:
Our core products/brands include the following:
Reports affecting the assets listed on our Scope page are generally considered eligible for submission. While we are primarily interested in reports affecting our core products, issues affecting other assets that are not explicitly listed may also be accepted. Report eligibility will ultimately be decided by the BILL security team based on internal review and investigation of asset ownership and security impact.
We are unable to grant authorization to test third-party assets that we do not host or that are otherwise outside of our control (e.g., SaaS products or other third-party platforms/tools that we use). Reports related to such assets will only be accepted if significant security impact to BILL is demonstrated. In many cases, reporting the issue directly to the vendor would be most appropriate. That said, issues within our control to fix or mitigate are generally considered valid, including security misconfigurations and vulnerabilities/patching relating to self-hosted assets.
Unless otherwise noted, reports for the following issues in HackerOne's Core Ineligible Findings list are considered invalid for our program and will generally not be accepted except in rare circumstances demonstrating clear security impact:
Unless otherwise noted, we adhere to HackerOne's Platform Standards and Core Clarifications.
Reports for publicly disclosed Zero-day vulnerabilities that have had an official patch for less than one month will be accepted only on a case-by-case basis.
BILL will make a best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
|---|---|
| Time to first response (from report submission) | 5 days |
| Time to triage (from first response) | 10 days |
| Time to resolution (from triage) | Depends on report severity and complexity |
We'll try to keep you informed about our progress throughout the process.
At this time, our program does not allow public disclosure. Please do not publish or discuss any discovered vulnerabilities (even resolved ones) outside of the program without express consent from BILL.
Please follow HackerOne's disclosure guidelines.
We adhere to HackerOne's Gold Standard Safe Harbor. Please see https://hackerone.com/bill/safe_harbor for more details.
Thank you for helping keep BILL and our users safe!