Napoleon Games is the Belgian leading gambling website where your can play several types of games:,, etc. Napoleon Games is a legal and safe website and is approved by the Belgian Gaming Commission.

0.1 - 3.9
4.0 - 6.9
7.0 - 8.9
9.0 - 9.4
9.5 - 10.0
Tier 2
Tier 2
€50 - €10,000
Rules of engagement
Not applicable
max. 5 requests/sec
Not applicable

By participating in this program, you agree to:

  • Respect the Community Code of Conduct
  • Respect the Intigriti Terms and Conditions
  • Respect the scope of the program
  • Not discuss or disclose vulnerability information without prior written consent (including PoC’s on YouTube and Vimeo)


Tier 2


Tier 2


Tier 2


Tier 2
In scope

We are looking for security vulnerabilities and for vulnerabilities that could lead to databreaches. In order to get the maximum value out of your creativity, we are opening the scope to our complete web environment.

We are especially looking for vulnerabilities regarding

  • Data extraction
  • Horizontal or vertical privilege escalation
  • Influencing game payouts
  • Adding money to your account without or with wrongfull payments
  • ...

In our opinion, the most interesting areas to focus would be:

  • (Mobile API)
  • Voucher payments
  • Gameserver entry point
Out of scope

Do not test againt our 3rd party game / sports / live casino providers:
Attention: this list may not be up-to-date.

  • Kambi (*
  • Evolution (*
  • Netent (*
  • Quickfire (*
  • Magnet Gaming (*
  • Netent (*
  • MicroGaming (*
  • Evonetworks (*

Do not test on our test environments:

  • *test *

IMPORTANT, known issues:

  • CSRF
  • Open Redirect

Napoleongames Applications:

  • and domains with DNS to the same location (eg.

Trying to influence our payment system is allowed (and even highly appreciated as a report!), but do not test againt our 3rd party payment providers.

  • Neteller
  • HiPay
  • Skrill
  • Paysafe


  • Wordpress usernames disclosure
  • Pre-Auth Account takeover/OAuth squatting
  • Self-XSS that cannot be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non-sensitive endpoints
  • Missing cookie flags
  • Missing security headers
  • Cross-site Request Forgery with no or low impact
  • Presence of autocomplete attribute on web forms
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits.
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking without proven impact/unrealistic user interaction
  • CSV Injection
  • Sessions not being invalidated (logout, enabling 2FA, etc.)
  • Tokens leaked to third parties
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Content injection without being able to modify the HTML
  • Username/email enumeration
  • Email bombing
  • HTTP Request smuggling without any proven impact
  • Homograph attacks
  • XMLRPC enabled
  • Banner grabbing/Version disclosure
  • Not stripping metadata of files
  • Same-site scripting
  • Subdomain takeover without taking over the subdomain
  • Arbitrary file upload without proof of the existence of the uploaded file
  • Blind SSRF without proven business impact (pingbacks are not sufficient)
  • Disclosed/misconfigured Google Maps API keys
  • Host header injection without proven business impact


  • In case that a reported vulnerability was already known to the company from their own tests, it will be flagged as a duplicate
  • Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited
  • Spam, social engineering and physical intrusion
  • DoS/DDoS attacks or brute force attacks
  • Vulnerabilities that only work on software that no longer receive security updates
  • Attacks requiring physical access to a victim's computer/device, man in the middle or compromised user accounts
  • Recently discovered zero-day vulnerabilities found in in-scope assets within 14 days after the public release of a patch or mitigation may be reported, but are usually not eligible for a bounty
  • Reports that state that software is out of date/vulnerable without a proof-of-concept
Severity assessment

Severity assessment:

This program follows Intigriti’s contextual CVSS standard
Note that Napoleon Games will perform risk assesment for each individual issue.

Cool-down period for zero-days
Recently discovered zero-day vulnerabilities found in in-scope assets within 14 days after the public release of a patch or mitigation may be reported, but are usually not eligible for a bounty. We may however decide to offer a bonus at our own discretion!

Examples of potential critical business impact:

  • SQL injection
  • Vertical privilege escalation
  • Bugs in our games that allow you to:
    • Extract game-related info of other players
    • Predict your chances of winning
    • Influence to win a game

Examples of potential exceptional business impact:

  • Remote code execution

Can we get test accounts

You are free to register an account but please use your address so we can track researchers in our production environment. Researchers that don't use an address will not be rewarded a bounty.

In case you are not able to register or you want to work with credits to test games, you can contact NapoleonGames through the Intigriti portal to request this. At that point you will be flagged as a test account and you will receive test money. Please note that by doing this, certain features (withdrawel,...) will no longer work on your account.

Cash player

If you do a self-registration you can enable cash modus and you will receive some credits for free.

How to register

Bypassing National number verification
Go to and click on 'Register now'.
--You will now be forwarded to the registration page, which is only available in Dutch anymore--
First page: Registratie/Account gegevens
Fill in your mail address and type in your password in the 'Wachtwoord' field.
Check all boxes, and click on 'Registeren'.
Second page: Choose 'Voltooi uw account handmatig'.
Third page: Registratie/Persoonlijke gegevens
Fill in all fields.
'Voornaam' = first name
'Achternaam' = last name
'Geboortedatum' = Date of birth
'Geboorteplaats' = Place of birth
Choose 'FR' in the 'Document van' field and enter a passport/ID-cardnumber in the 'Nationale identiteitskaart nr.*' field (12 numbers).
Choose 'België' in the 'Land van verblijf' field (important because otherwise it's possible that you can't use your account due to geoblocking).
Fill in all other mandatory fields.
'Straat' = street
'Number/bus' = streetnumber
'Stad' = City
'Postcode' = Postal Code
'Telefoonnummer' = telephone number
Click on 'Registreren'.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

last contributors
Overall stats
submissions received
average payout
accepted submissions
total payouts
Last 90 day response times
avg. time first response
< 24 hours
avg. time to decide
< 3 weeks
avg. time to triage
< 2 days
Napoleon Games
closed a submission
created a submission
created a submission
Napoleon Games
closed a submission
Napoleon Games
closed a submission
created a submission
Napoleon Games
closed a submission
created a submission
created a submission
Napoleon Games
closed a submission