
Linktree
External Program
Submit bugs directly to this organization
With 30 million global users, Linktree is helping brands, artists, publishers, agencies and influencers better control their presence online. The security of our platform is more important than ever, and we believe the global security community is a big part of that.
The scope for Linktree's Bug Bounty program is inclusive of most of our assets. If you find something that would be impactful to our users, we want to hear about it.
Your participation in our Bug Bounty Program is voluntary. By submitting a report or otherwise disclosing a vulnerability to us (making a “Submission”), you are indicating that you have read and agree to follow the rules set forth on this page (“Program Terms”).
We have placed the program temporarily on hold to allow us time to manage all the reports submitted over the holiday period. We thank you for your patience at this time, and we look forward to future submissions.
Linktree will make a best effort to meet the following SLAs for hackers participating in our program:
| Type of Response | SLA in business days |
|---|---|
| First Response | 2 days |
| Time to Triage | 5 days |
| Time to Bounty | 14 days |
| Time to Resolution | Depending on complexity and severity of issue |
We’ll keep you informed about our progress through each stage of response.
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
Do not access, impact, destroy or otherwise negatively impact Linktree customers, or customer data in anyway.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder. Respect our users’ privacy.
No extortion, shake downs, or duress.
Don’t leave any system in a more vulnerable state than you found it.
Be respectful when interacting on reports with our team.
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
When a vulnerability consists of different parameters but having the same api endpoint please group this together in the same report.
When a vulnerability is occurs to a third party integration (such as PayPal, etc) we will treat all reports as a single report
When duplicates occur, we only award the first report that was received (provided that it can be fully reproduced).
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
Social engineering of in-product support is allowed. Social engineer through other channels is not allowed.
Access control bypass issues in link lock features pointing to public content are classified as Low severity.
Deleted assets/items that are still accessible are classified as Low severity.
Cross-Site Scripting (XSS) attacks are considered at maximum a Medium severity.
Obtaining access to individual paid features for Free accounts are classified as Low severity
Sub-domain takeovers are considered at maximum a Medium severity.
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Linktree and our users safe!