OUT OF SCOPE
Rate limit bypass on Grok/xAI APIs — explicitly excluded in program policy. Model behavior issues — report to safety@x.ai instead. CSRF without evidence, open redirects without higher risk, DoS.
IN SCOPE
19 assets on x.com. Auth bugs, IDOR on private data, stored XSS. Open-source recommendation algorithm (needs working PoC). API auth scope issues (not rate limiting).
LOW
$250–$750 · avg $100 · 20% of reports
MEDIUM
$1,000–$3,000 · avg $1,417 · 40% of reports
HIGH
$5,000–$7,000 · avg $4,833 · 30% of reports
CRITICAL
$10,000–$20,000 · avg $15,000 · 10% of reports
Account Takeover (Critical)
OAuth flow manipulation, session fixation, auth token leakage. access-control-001 applies. Critical severity = $10–20K avg $15K. This is the target.
IDOR on Private Data
Private tweets/DMs via ID enumeration, draft access, private list contents. H1 platform standard: unpredictable IDs still valid (AC:H). PII leak = Critical per platform standards.
Recommendation Algorithm
Open-source on GitHub. Algorithmic manipulation via crafted content, ranking injection. Needs working PoC. X's discretion on severity — document everything.
Stored XSS on x.com
Profile fields, bio injection, tweet rendering. Stored XSS = account takeover at scale = Critical. Most obvious surface but also most hunted.
Total Paid
$1,754,355 since 2014 · avg $560/report · top range $2,940–$20,160
Activity (90 days)
839 reports received · $43,650 paid · last resolved 15 days ago
Response Speed
14h first response · 1d 8h triage · 1wk 2d to bounty · 99% efficiency
Competition
Top: filedescriptor (4K rep) · nismo (1K) · akhil-reni (915). Competitive but pays well and fast. 1,639 total resolved = mature program.
OG
The rate limit / Grok angle is dead — explicitly excluded. The real surface is x.com auth + IDOR. Account takeover at critical = $15K avg. That's the target. auth-bypass-001 is the PoC to build.
RHONE
$1.75M total paid since 2014. 839 reports in 90 days = high-volume active program. 99% response + 14h first response = fastest triage on the board. File a clean report, get fast feedback.
RICK
Recommendation algorithm is the novel angle — open source means we can actually read the code. If ranking can be manipulated via crafted interactions, that's a finding no one else is looking at because it requires understanding the algo.
Next Action
Pull the 19 in-scope assets from the scope tab. Map each asset. Then: (1) clone the recommendation algo repo and look for ranking manipulation vectors, (2) test OAuth flow for token leakage. Both require working PoC. Program has high bar but pays fast.