No technology is perfect, and pixiv believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Disclosure Policy
- Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
- It is not permitted to publicly disclose reports without the express consent of pixiv's security team.
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
Program Rules
While researching, we'd like to ask you to refrain from:
-
Denial of service
-
Spamming (Examples include, but are not limited to, the following):
- Sending unintelligible messages or comments to general users. (If an investigation requires multiple actors, please prepare multiple accounts of your own to avoid involving general users.)
- Exposing your investigation to the public by modifying third-party or public resources. (While we understand this can be challenging due to the nature of social networking services, please ensure that your activities remain as discreet as possible.)
-
Social engineering (including phishing) of pixiv staff or contractors
-
Any physical attempts against pixiv property or data centers
-
Re-uploading other users' assets such as drawings and 3D models for testing of pixiv features
If spam or other disruptive behavior is detected, we may take the same actions as we do with regular spammers, such as account suspension.
Furthermore, if such prohibited or disruptive acts are discovered during the reporting process, no bounty will be awarded.
Out of Scope / Known Issues
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
- Hypothetical or theoretical vulnerabilities without actual verification code
- Insecure coding or design patterns without actual vulnerabilities
- Vulnerabilities with capability of brute force against password or tokens
- Password, email and account policies, such as email id verification, reset link expiration, password complexity
- Login/Logout CSRF
- CSRF on forms that are available to anonymous users (e.g. contact form)
- Vulnerabilities found in domains out-of-scope
- Vulnerabilities affecting outdated browsers or platforms
- Presence of autocomplete attribute on web forms
- Missing secure flags on non-sensitive cookies
- Reports of insecure SSL/TLS ciphers
- Vulnerabilities with capability of username/email enumeration
- Descriptive error messages (e.g. Stack traces, application or server errors)
- Banner disclosure on servers
- Misconfiguration of SPF record, DMARC and DKIM
- Lack of security headers without an actual attack scenario
- Phishing attack via registration email (e.g. making username a URL)
- Tabnabbing
- Disclosure of pixiv's numeric ID such as user ID and illustration ID (unless it compromises user privacy)
- Lack of rate limit
- Assets remaining visible on CDN after changing its visibility from public to private
- Manipulating number of views
- Insufficient session expiration
- Backup of app data
- Race conditions which do not involve privacy or monetary risk
- IDOR which do not involve privacy or monetary risk (e.g. bookmarking private contents while gaining no information about it)
- Lack of URL confirmation on outgoing links
- Broken link hijacking (social media account etc): You may submit a report for this issue and it will be closed as informative, not eligible for bounty
- Misuse of the outgoing link URL confirmation page to generate links to arbitrary external websites.
- Investigation reports that are deemed to have used insider information, such as from employees, are not eligible for a reward.
Duplicate Reports
When we receive multiple reports concerning the same underlying cause, the eligibility for a bounty for later reports will be evaluated based on the value of new information provided to us.
Any report that does not offer new value beyond what was included in an earlier report will be considered a duplicate and will be closed.
Credentials for PIXIV Accounts
We will consider a report beneficial and award a bounty of $100 per report if it contains 100 or more valid credentials that are not detected by our current Password Leak Detection System.
To speed up the list review, please attach the credentials to the report in TSV/CSV format: <username> \t <password> \t <URL (optional)>.
Regarding PIXIV accounts:
- There are currently approximately 110 million PIXIV accounts.
- Information that could allow intrusion into 100,000 of these accounts will be considered a vulnerability of High severity.
- We will therefore pay $0.03 per credential.
Additional Conditions:
- A bounty will not be awarded if the list is largely comprised of accounts that have been illegally or fraudulently created in large numbers, such as through automation. (This is to prevent the creation of lists and accounts solely for the purpose of claiming a bounty.)
- If the credentials belong to special accounts (e.g., the pixiv official account, https://www.pixiv.net/users/11), a separate bounty will be considered based on the potential impact that unauthorized access to that specific account could cause.
- Regarding an account on account.pixiv.net, which we refer to as a pixiv account, the email address being @pixiv.net does not indicate that it belongs to an employee.(In the past, the ownership of an email address has not always been strictly verified.)
Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep pixiv and our users safe!