
Grindr
External Program
Submit bugs directly to this organization
Grindr is excited to be working with the HackerOne security community to help find security vulnerabilities. We are happy to work together to keep Grindr and our users safe. Please report security issues or concerns you find and note the "Out of Scope Vulnerabilities" and "Bounties and Rewards" sections to understand how we reward findings.
Please note that this service is only for the submission of technical security issues. If you need help with a support issue (account, billing, safety, privacy etc.), please reach out to our help center: https://help.grindr.com/hc/en-us/requests/new
Here are some safety & privacy tips: https://help.grindr.com/hc/en-us/categories/1500001110042-Safety-Privacy
Your participation in our Security Vulnerability Reporting Program is voluntary. By joining our Security Vulnerability Reporting Program, submitting a report, or otherwise disclosing a vulnerability to us (“Submission”), you are indicating that you have read and agree to follow the rules set forth on this page (“Program Terms”).
If (i) you do not meet the eligibility requirements below; (ii) you breach any of these Program Terms or any other agreements you have with Grindr or its affiliates; or (iii) we determine that your participation in our Security Vulnerability Reporting Program could adversely impact us, our affiliates, or any of our users, employees, or agents, we, in our sole and absolute discretion, may remove you from our Security Vulnerability Reporting Program and disqualify you from receiving any benefit of our Security Vulnerability Reporting Program.
Any information you receive, collect or otherwise obtain about us, our services, our affiliates or any of our users, employees, or agents in connection with our Security Vulnerability Reporting Program (whether after or before you joined the Security Vulnerability Reporting Program, notably as a result of you finding and/or investigating a security bug in our in-scope applications or infrastructure) (“Confidential Information”) must be kept confidential, only used in connection with the Security Vulnerability Reporting Program, and not disclosed to any third party. You may not use, disclose or distribute any such Confidential Information, including without limitation any information regarding your participation in our Security Vulnerability Reporting Program and any Submission.
By joining and participating in our Security Vulnerability Reporting Program, you represent and warrant that you have not used and will not use Confidential Information for any purpose other than in connection with the Security Vulnerability Reporting Program and that you have not shared and will not share such Confidential Information with any third party.
Once a Submission is made, Grindr reserves the right to request from you, and you already accept to abide by this request, to securely and irreversibly delete any data related to such Submission, including, without limitation, any data about us, our services, our affiliates, or any of our users, employees, or agents. Additionally, you agree to securely and irreversibly delete any data related to the Submission immediately upon it no longer being reasonably necessary to retain for the purposes of conveying the impact or scope of the reported issue, after verifying with Grindr that it is no longer necessary, and/or if the Submission is closed, regardless of outcome.
To participate in our Security Vulnerability Reporting Program, you must:
You are responsible for any tax implications of a bounty or reward from our Security Vulnerability Reporting Program in accordance with your country of residency and citizenship.
Grindr will make a best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
|---|---|
| First Response | 5 days |
| Time to Triage | 10 days |
| Time to Bounty | 15 days |
| Time to Resolution | depends on severity and complexity |
We will try to keep you informed about our progress throughout the process.
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a bounty.
Our bounties and rewards are based on severity per CVSS (the Common Vulnerability Scoring Standard). If an issue is low priority, CVSS scoring may not be used and a small bounty may be provided. Please note these are general guidelines. Bounty and reward decisions are up to the discretion of Grindr.
The following tables highlight the severity associated with different types of security issues, assuming they are not specified as being “out-of-scope”.
Note that sensitive and personal data includes private chats or media (photos, videos, audio, etc.) that users share with each other. It also includes location information beyond what is normally provided within the Grindr application.
| Severity | Vulnerability |
|---|---|
| Critical | Server-Side Remote Code Execution (e.g. command injection). |
| Ability to inject arbitrary code into the Grindr mobile application or to hijack, tamper, or reverse engineer the Grindr mobile application in a way that causes another user’s account to be taken over or significantly abused or that causes sensitive or personal data to be revealed without expected access control. | |
| Arbitrary SQL queries on a production database. | |
| Significant Authentication Bypass / Logic Flaw | |
| High | API Disclosure of sensitive or personal information without expected access control or failure to protect such sensitive or personal information with reasonable encryption and key management. |
| Medium | Passing untrusted inputs to backend API's or method calls made within the Grindr mobile application code or tampering with the mobile application in ways that significantly enable fraud. For example exploits that make creating large numbers of fake users possible or spamming users with fake chat messages significantly easier than doing it manually or with bot automation simulating users. |
| Low | Improper Platform Usage: Misuse or failure to use cloud, mobile or web browser application platform security controls that does not affect access control or sensitive/personal data. |
| Any injection or XSS attack that does not affect access control or sensitive/personal data. | |
| Any usage of dependencies that does not affect access control or sensitive/personal data. |
Bounties are typically not given for vulnerabilities reported that are out-of-scope in any of the following ways. Exceptions may be made for vulnerabilities that have a proof-of-concept that demonstrates a significant attack (like a breach or access to sensitive data).
Any activities conducted in a manner consistent with this policy will be considered authorized conduct, and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
We may modify the Program Terms or cancel our Security Vulnerability Reporting Program at any time in our sole and absolute discretion.
As a condition of participation in our Security Vulnerability Reporting Program, you hereby grant Grindr and its affiliates a perpetual, irrevocable, worldwide, royalty-free, transferrable, sublicensable, and exclusive license to use, reproduce, adapt, modify, publish, distribute, publicly perform, create derivative work from, make, use, sell, offer for sale, and import the Submission, as well as any materials submitted to Grindr in connection therewith, for any purpose. You should not send us any Submission that you do not wish to license to us. You hereby represent and warrant that the Submission is original to you and you own all right, title and interest in and to the Submission.
Thank you for helping keep Grindr and our users safe!