
Superhuman (formerly Grammarly)
External Program
Submit bugs directly to this organization


External Program
Submit bugs directly to this organization
Welcome, Hackers 👋
We’ve merged the Grammarly and Coda programs into a single unified program — Superhuman (formerly Grammarly).
We’re excited to continue working with the security community to help keep our users, data, and systems secure.
Superhuman builds powerful, collaborative tools that bring words, data, and teams together — from the next generation of document creation (formerly Coda) to AI-enhanced writing and productivity tools (formerly Grammarly).
Security and privacy remain at the core of everything we build. We look forward to collaborating with researchers worldwide to identify and resolve vulnerabilities responsibly.
*.grammarly.com*.coda.io*.superhuman.com (excluding Superhuman Mail — see below)💡 Note: Vulnerabilities in the Superhuman Mail product are out of scope. We are working on logistics to create a new program for this.
| Stage | Target Timeframe |
|---|---|
| Time to first response | 2 business days |
| Time to triage | 4 business days |
| Time to bounty (after triage) | 7 business days |
We’ll keep you updated throughout the process.
Create your own test accounts to explore and validate findings.
For Coda testing:
hackeronetester to your email (e.g., [email protected]) if you’re not using a @wearehackerone.com domain.For Grammarly/Superhuman testing:
@wearehackerone.com to sign up.hackeronetester to your email (e.g., [email protected]) if you’re not using a @wearehackerone.com domain.Need a specific subscription level? Contact us, and we’ll provide access as needed.
We are currently not providing free upgrades for testing. We will update when we plan to resume; please do not create support tickets requesting a subscription or related questions about bug bounties.
When reporting, please consider exploitability and impact. The following are out of scope or non-qualifying:
/api/oembedResolve (uses Iframely)We reward based on the impact and severity of the vulnerability.
Final bounty amounts are at the discretion of the Superhuman Security Team.
Bounty tiers for different products:
Duplicate reports (including known internal issues) will not be rewarded.
Multiple vulnerabilities from a single root cause may be combined into one payout.
⚑ CTF Challenge
The first hacker who reports the$FLAGsaved in document ID1198436185under user[email protected](user_id1411519194) in Grammarly (Classic doc only) will earn a $100,000 bounty.
If it’s in scope, the challenge remains active — no need to ask for confirmation.
We comply with HackerOne’s Golden Safe Harbor Standard.
Activities conducted in accordance with this policy will be considered authorized and exempt from legal action.
Former employees and contractors of Superhuman are ineligible for bug-bounty payments for 6 months after their employment ends.
Need additional test environments or subscriptions?
Reach us directly via your HackerOne submission or contact [email protected].
Thank you for helping keep Superhuman, our users, and the broader community safe.
We deeply appreciate your skill, curiosity, and professionalism — together, we’re building something truly secure 🚀