
Blockchain.com Managed Bug Bounty Engagement
Bounty Range
$100 - $10,000
external program


Bounty Range
$100 - $10,000
external program
Welcome to the Blockchain.com Bug Bounty Program!
As a pioneer in the cryptocurrency space, Blockchain.com has been at the forefront of developing crucial infrastructure for the Bitcoin community. We started with the Blockchain Explorer, empowering users to examine transactions and understand the blockchain, and an API that enabled businesses to build on Bitcoin. Furthermore, we provide a widely popular and user-friendly crypto wallet, allowing individuals globally to securely manage their own digital assets.
Thank you for your interest in helping us enhance the security of our platform! Your contributions are highly valued.
If you are new to Blockchain.com, we strongly encourage you to review our Security Learning Portal to familiarise yourself with our products and their security considerations before submitting any reports.
For the initial prioritization/rating of findings, this engagement will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
| Priority | Reward |
|---|---|
| P1 | $7,000 – $10,000 |
| P2 | $3,000 – $5,000 |
| P3 | $700 – $1,250 |
| P4 | $100 – $250 |
| Target | Type |
|---|---|
| https://www.blockchain.com | Website (NextJS, Cryptocurrency) |
| Blockchain.com: Crypto Wallet (iOS) | Mobile Application (Swift, iOS) |
| Blockchain.com: Crypto Wallet (Android) | Mobile Application (Kotlin, Android) |
| api.blockchain.info | API Testing |
| ws.blockchain.info | API Testing |
Testing is only authorized on the targets listed as in scope. Any domain/property of Blockchain.com not listed in the targets section is out of scope. This includes any/all subdomains not listed above. If you happen to identify a security vulnerability on a target that is not in scope, but it demonstrably belongs to Blockchain.com, you can report it to this engagement. However, be aware that it is ineligible for rewards or points-based compensation.
To gain access to the application, please sign up for an account using your @bugcrowdninja.com email address. You may register for accounts at the signup page.
Please add the following header to your HTTP traffic to prevent interruptions and verify non-malicious behavior:
X-Bug-Bounty:<bugcrowdusername>
Potential post-exploitation scenarios: If you believe you've identified a vulnerability that may lead to post-exploitation activity including modification or destruction of data please stop testing and submit your finding. We will work with you to evaluate the vulnerability and award you accordingly for the final impact and severity.
Web applications operated by third parties are only considered in scope under the following ways:
The following assets represent third-party applications, along with their vendors to report issues to:
If you happen to identify vulnerabilities involving data that has been exposed or leaked such as dark web forums or leaked credential sites, you can report it to this engagement. However, be aware that it is only eligible for points-based compensation. This policy helps maintain the highest standard of operational confidentiality, integrity, and compliance.
When conducting vulnerability research according to this policy, we consider this research to be:
You are expected, as always, to comply with all applicable laws.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please inquire through the Bugcrowd Support Portal before going any further.
This engagement follows Bugcrowd's standard disclosure terms. Vulnerabilities found in this engagement require explicit permission by selecting the disclosure request option on your submission. For more information please review the Public Disclosure Policy.