Introduction
We are happy to announce our Vulnerability Disclosure Program (VDP)! We've done our best to clean up our known issues and now would like to request your help to spot the ones we missed!
Our worst-case scenarios are:
There's two scenarios that keep us awake at night:
- Remote account takeover: being able to takeover one of our customers accounts and drain their balance;
- Exposing existing rewards: enumerating payouts that have already been sent and redeeming them.
Any useful infrastructure information:
Primary domain & API:
- tremendous.com (marketing site)
- app.tremendous.com (customer dashboard)
- api.tremendous.com (public API)
- reward.tremendous.com (recipient page)
Sandbox environment (mirrors production, but no real money involved):
- app.testflight.tremendous.com (customer dashboard)
- api.testflight.tremendous.com (public API for integration testing)
Authentication & Access Control:
- We use industry-standard authentication and authorization mechanisms.
- Researchers should focus on misconfigurations, privilege escalation, and improper session handling.
Technology Environment (high-level):
- Reverse proxies and WAF (Cloudflare).
- Core services orchestrated on Kubernetes.
- Common web technologies (REST APIs, standard HTTP methods, JSON payloads).
Data Sensitivity:
- Platform handles financial transactions, personal recipient information, and payment instrument distribution.
- Researchers should prioritize vulnerabilities impacting confidentiality, integrity, or availability of this data.
Bounties
This is a responsible disclosure program without bounties.
Marketing video example
https://www.youtube.com/watch?v=pqZ2pVMddcU
Feedback
Would you like to help us improve our program or have some feedback to share, please send your anonymous feedback here:
Program feedback link
Please note this form will be checked periodically and should not be used for submission or support queries.