
Boozt Fashion AB
External Program
Submit bugs directly to this organization


External Program
Submit bugs directly to this organization
Boozt invites you to help enhance our security. We value your expertise in identifying vulnerabilities. We're serious about security and eager to collaborate. Join us in making a difference.
Boozt will make its best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
|---|---|
| First Response | 2 days |
| Time to Triage | 5 days |
| Time to Bounty | 14 days |
| Time to Resolution | depends on severity and complexity |
We’ll try to keep you informed about our progress throughout the process.
Follow HackerOne's disclosure guidelines.
After a report has been triaged by HackerOne, we will conduct an internal investigation to understand the impact of the vulnerability on our customers; the final severity will always factor in an assessment of how the issue affects our customers. Issues that can only be leveraged to attack one's own account will have their severity score or applicability reflect this.
Reports for security issues that aren't vulnerabilities in our systems might receive a bounty based on our assessment of the impact of the finding.
We invite you to identify and report security vulnerabilities in our core services, specifically our primary websites and the associated payment gateway, Kronor. The following targets are within the scope of this program:
Core applications: these are our websites and companion mobile applications.
Web applications:
www.boozt.comwww.booztlet.comMobile applications:
com.boozt.app / com.booztcom.boozt.booztlet / com.booztletKronor, a payment gateway serving merchants in the nordics.
https://kronor.io/v1/graphqlhttps://payment-gateway.kronor.iohttps://kronor.io/cde/gqlWe are interested in both isolated vulnerabilities in these endpoints and issues related to the integration of these endpoints with our websites and mobile applications.
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
@wearehackerone.com email when registering.The following are prohibited:
Eligibility Requirements:
In addition to the above consideration, you are not eligible for the program if you are a current or former Boozt Group employee or consultant.
Please note that any vulnerabilities found in third-party libraries or frameworks used by any of the targets are not in scope for this program, unless they directly impact the security of the target applications.
HttpOnly or Secure flags on cookies.The following issues are known to us and are being actively worked on. We consider them to be out of scope while remediation is in progress.
/api/me/favorites endpoint.Any issue in our mobile applications that can only be exploited on a jailbroken or rooted device will be considered out of scope.
We will keep this section regularly updated with changes to our assets that might have relevant security implications.
Thank you for helping keep Boozt and our customers safe!