Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 133

Bug Bounty Program

What is Bug Bounty Program?

Bug Bounty ProgramA formal initiative through which an organisation invites external researchers to report security vulnerabilities and pays rewards based on impact.


A bug bounty program turns crowd-sourced security testing into a controlled process. The organisation publishes scope, rules of engagement, exclusions, and reward tiers, then receives reports from independent researchers via its own platform or a triage provider such as HackerOne, Bugcrowd, or Intigriti. Findings are validated, reproduced, prioritised, and remediated, with payouts tied to severity (often based on CVSS). Programs may be public or private (invitation-only) and complement, but do not replace, internal AppSec, SAST/DAST tooling, and penetration tests. A safe-harbour legal statement is essential so good-faith researchers are not pursued under anti-hacking laws.

Examples

  1. 01

    Google Vulnerability Reward Program, Microsoft Bug Bounty, Apple Security Bounty.

  2. 02

    A SaaS vendor running a private invitation-only program on HackerOne with payouts from $500 to $50,000.

Frequently asked questions

What is Bug Bounty Program?

A formal initiative through which an organisation invites external researchers to report security vulnerabilities and pays rewards based on impact. It belongs to the Attacks & Threats category of cybersecurity.

What does Bug Bounty Program mean?

A formal initiative through which an organisation invites external researchers to report security vulnerabilities and pays rewards based on impact.

How does Bug Bounty Program work?

A bug bounty program turns crowd-sourced security testing into a controlled process. The organisation publishes scope, rules of engagement, exclusions, and reward tiers, then receives reports from independent researchers via its own platform or a triage provider such as HackerOne, Bugcrowd, or Intigriti. Findings are validated, reproduced, prioritised, and remediated, with payouts tied to severity (often based on CVSS). Programs may be public or private (invitation-only) and complement, but do not replace, internal AppSec, SAST/DAST tooling, and penetration tests. A safe-harbour legal statement is essential so good-faith researchers are not pursued under anti-hacking laws.

How do you defend against Bug Bounty Program?

Defences for Bug Bounty Program typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Bug Bounty Program?

Common alternative names include: Vulnerability Reward Program, VRP.

Related terms

See also