Maximum bounty is determined by vulnerability type cap regardless of CVSS score.
Bounty depends on demonstrated business impact and asset criticality.
The final bounty amount is determined based on:
- Demonstrated business impact
- Sensitivity of affected data or functionality
- Exploitability and reproducibility
- Privilege level required
- Scope and trust boundary crossed
- Scalability of the attack
- Quality and completeness of the report
The amounts listed in the table below represent the maximum available bounty for each vulnerability category and asset tier.
The final bounty will not exceed the maximum cap defined for the vulnerability type, regardless of CVSS score.
Maximum Bounty Caps
| Vulnerabilities | Tier 1 | Tier 2 | Tier 3 |
| RCE | 15000 | 7500 | 2250 |
| Server-side injections (SQLi or an alternative) | 9000 | 6000 | 1500 |
| Read local file content (LFR, XXE) without restrictions (jail/chroot/other file type restrictions) | 9000 | 6000 | 1500 |
| RCE in the Dev infrastructure / isolated or virtualized process | 5000 | 2500 | 750 |
| Read local file content (LFR, XXE) in the Dev infrastructure / isolated or virtualized process | 900 | 600 | 150 |
| Full-read SSRF* | 5000 | 3000 | 1000 |
| XSS** | 100 | 100 - 1000 | 50 - 500 |
| IDOR / BAC | 4500 | 1500 | 500 |
| Business logic** | 50 - 1000 | 50 - 1000 | 50 - 500 |
| Subdomain takeover | 100 | 100 | 100 |
*allowing access to internal services or cloud metadata
**depending on impact on the core application
XSS
XSS that does not allow access to authenticated sessions, user data, privileged functionality, or trust-boundary crossing may be classified as Low severity regardless of CVSS score and may be rewarded at the lower bound.
IDOR / Broken access control
Reward is determined by sensitivity of exposed data and privilege boundary crossed.
Business logic vulnerabilities (financial or workflow abuse)
Theoretical financial gain without practical exploitability may be rewarded at the lower bound.
Impact must be realistically reproducible under normal system constraints to qualify for higher rewards.
Subdomain takeover
Subdomain takeovers are classified as Low severity by default, without a CVSS score being assigned, as the primary attack vector is considered to rely on social engineering. If it can be demonstrated that the takeover can be chained with another vulnerability to achieve greater impact, the severity may be re-evaluated. Sufficient evidence or a proof-of-concept is expected in such cases.
Bounties for security issues affecting mycapital.capital.com are set at a lower level and are assessed on a case-by-case basis.