Hack Club Security Program

meow

Hi! I’m Allen and I’m Echo. We are running the security bounty program for Hack Club. Thank you for your help in keeping Hack Club secure!

We both have backgrounds in earning security bounties and are excited to bring this to Hack Club.

We are currently working on a new version of the security bounty program. This new version will have better refined severity definitions and a more comprehensive program structure. We are excited to share this with you soon! Until then, we still accept submissions for all programs.

Participating Programs

All Hack Club programs are under this security program. Here are a highlights of programs that are currently participating in the security bounty program:

HCB

Fiscal sponsorship platform for student organizations and non-profits

hcb.hackclub.com
bank.engineering

Hack Club Website

Main homepage for Hack Club

hackclub.com

Moonshot

You and 100 Hack Clubbers will fly to Orlando, Florida, December 12–15.

moonshot.hackclub.com

Blueprint

Design a hardware project, and we'll pay for hardware to build it!

blueprint.hackclub.com

Shiba

Make a game. Build an arcade in Tokyo.

shiba.hackclub.com

Clubs

Hack Club's coding club network of over 900+ clubs worldwide

dashboard.hackclub.com
toolbox.hackclub.com

Summer of Making

Hack Club's Flagship Summer event for 2025

summer.hackclub.com

Hackatime

Hack Club's in-house time tracking software

hackatime.hackclub.com

Hack Club Identity

Hack Club's Identity Verification Platform, also known as Identity Vault

identity.hackclub.com

PII Severity Definitions

One thing we have a lot here at Hack Club is information, and we want to make sure that it is well protected. We have defined the severity of the information based on how much it could be used to harm someone.

Critical

  • • Government-issued ID
  • • Identity verification documents

High Severity

  • • Physical address

Medium Severity

  • • Private email address on Hack Club platforms
  • • Phone numbers
  • • Birthday or age

Low Severity

  • • IP addresses
  • • Legal names
  • • Non-public program information

We define a leak as any person who has not signed a Hack Club NDA having access to the above data due to our systems failing to keep it safe. If the user self-declares any information covered in these tiers, it is not considered a vulnerability.

Payout Tiers

As a thank you for helping us keep Hack Club secure, we are offering bounties for finding vulnerabilities in our systems. The payouts are based on the severity of the vulnerability and the impact it has on our users.

PII Bounty Tiers

$300
High severity PII leak
affecting 100+ people
$150
Medium severity PII leak
affecting 50+ people
$50
Medium severity (5+ people)
or Low severity (50+ people)
$20
Low severity PII leak
affecting 10+ people

Remote Code Execution

$500
Root access to servers
*.selfhosted.hackclub.com, hcb.hackclub.com, or admin access to vercel.com/@hackclub GitHub (outside Docker)
$250
Non-root access
to any of the above (outside Docker)

Other Vulnerabilities

$100
Authentication Bypass
OAuth flaws, session management vulnerabilities, improper access controls
$100
SQL Injection
Or any other exploit against Postgres or Airtable databases
$50
Information Disclosure
Exposed admin panels, configuration issues
XSS & Others
Cross-Site Scripting, CSRF, etc.
Paid according to PII impact (see above)

Bonus

+25% bonus
Include Fix with Report
Submit a git diff that fixes the vulnerability being reported

Out of Scope

When reporting vulnerabilities, please consider attack scenario, and potential impact of the bug. Also note that any program not participating in this program is out of scope. While you are welcome to report issues regarding them, you are not guaranteed a payout. The following issues are generally considered to be out of scope (not an complete list):

  • Scraping public Slack information or account enumeration
  • Brute force attacks
  • Clickjacking without significant impact
  • Automated scanner outputs without real-world impact
  • Social engineering or phishing attacks
  • Self-exploitation requiring user interaction
  • Denial of Service causing resource exhaustion
  • Exploits related to the Slack platform that are out of our control

Notice for AI Generated Reports

Bounty programs have seen AI-generated submissions that lack any real-world impact. While the use of AI as a tool to help improve your report is allowed, submissions that are entirely AI-generated with no original researcher input will not be accepted. We are looking for original research with real-world impact. AI should support your research, not replace it.

How to Report

Submit vulnerabilities via this site, and we will pursue further contact via email

Submit Report →

Payout Options

Check by mail, Wise Transfers, HCB Visa Card, or cryptocurrency

If these payout options do not work, we will try our best to figure out the best possible way to award you. The program in which the vulnerability is found will cover the cost of the payout.

Run by Allen and Echo, website by Echo • Art by bunnyguy • We are on HCB