Superside is dedicated to safeguarding the security of our users and customers. In line with this dedication, we extend an invitation to security researchers to assist us in protecting Superside and our users by proactively identifying security vulnerabilities through our bug bounty program. Our program offers an extensive array of rewards tailored to different types of vulnerabilities, ensuring that your efforts are not only recognized but also duly compensated. We encourage security researchers who wish to participate in our bug bounty program to carefully review this policy for compliance with our rules. Additionally, this will help you safely verify any vulnerabilities you discover.
Testing is only authorized on the targets listed as in scope. Any domain/property of Superside not listed in the targets section is out of scope. This includes any/all subdomains not listed above. However, if you happen to identify a security vulnerability on a target that is not in scope, but it demonstrably belongs to Superside, you can report it in this program.
superside.com
and all of it’s subdomains *.superside.com
are out of scope, testing is only authorized on staging environment *.supersidestaging.com
which hosts targets in scope.Vulnerabilities that are considered valid reports for our Bug Bounty Program can be found here with the following exclusions:
All rewards determined by Superside will be paid exclusively through wire transfers to eligible individuals in the calendar month following the month in which the vulnerability report is approved by Superside. For example, reports accepted in June will be rewarded in July.
Superside will not engage in legal action against individuals who submit vulnerability reports through our Vulnerability Reporting inbox. We openly accept reports for the currently listed Superside products. We agree not to pursue legal action against individuals who: