"Digitaal Vlaanderen" is the IT and digital transformation departement within the Flanders’ governmental IT. Positioned as the digital gateway and data broker between all Flemish government entities, we want to be at the top of our game. Our security ought to be too. For this program we are focusing at first instance on some of our main assets.


This is a responsible disclosure program without bounties.

Rules of engagement
Not applicable
max. 1 request/sec
Not applicable

By participating in this program, you agree to:

  • For the IDM scope, you can only request a test account with your e-mail account
  • Respect the Community Code of Conduct
  • Respect the Terms and Conditions
  • Respect the scope of the program
  • Not discuss or disclose vulnerability information without prior written consent, including PoC's on public Youtube or Vimeo channels.
  • We appreciate a video PoC in case of complicated vulnerabilities.


Tier 2

All and any subsites of,
-for which authentication is not needed
-for which creation of account(s) is not needed

For some subsites, a government entity other than Digitaal Vlaanderen may be responsible. We can accept the disclosed vulnerability and relay the issue to the concerned entity, yet we then cannot guarantee they will (be able to) fix it.

No Bounty

Authenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

No Bounty

Unauthenticated demo environment for the widget platform. The website itself is just an illustrative example and should not be tested.

No Bounty

Embeddable portion of My Citizen Profile

No Bounty

My Citizen Profile (Mijn Burgerprofiel in Dutch) is the go-to spot for citizens to manage their affairs digitally with the government. Citizens can access their personal data, consult status reports, download certificates, and request new government services such as a permit of subsidy. My Citizen Profile is a plug-in that can be integrated into different official government websites, be it on a Flemish or local level.

Available in Dutch - More information can also be found on (only in Dutch).

This beta environment is equiped with a mock authentication (OpenID) service, which can generate tokens for different kinds of accounts. As such, the authentication flow of this mocked service is not in scope.

No Bounty

User Management (IDM) is a platform with which you can manage the inflow and outflow of people and their rights to applications.

It is a central rights management for different applications within the entire Flemish administration. It controls the inflow and outflow of employees and their rights and is editable to be tailored to the tasks of each employee.

More information is available on There is detailed product and technical information available for download (in Dutch only).

To be able to test the platform, you will need to create a (dummy) account in our test environment. You can only do this with your e-mail account via a self-registering system available at You can register with “Kinepolis Group” as a "Hoofd Lokale Beheerder". When you do so, please send an e-mail to with in the subject line "Project Intigriti". We will inform you when the right has been given.

The application is also available in English via this link:

In scope

We've done our best to clean most of our known issues and now would like to request your help to spot the ones we missed! We are specifically looking for

  • Leaking of personal data
  • Horizontal / vertical privilege escalation
  • SQL injection vulnerabilities
  • Arbitrary file upload (proof of the existence of the uploaded file required)
  • Sessions not being invalidated (logout, enabling 2FA, ..)
  • Hyperlink injection/takeovers
  • Cross-domain referer leakage
  • Username / email enumeration (for internal e-mail accounts)

Subdomain Takeover
If a certain subdomain seems to be vulnerable to subdomain takeover, we want to know this but we ask to not take over the corresponding subdomain itself. Make sure you give a proper explanation on how to take this over and which service is responsible for this.

Out of scope

This specific list of sites and their subsites

* (added on 28/march/2023 at 10h41 CET) (added on 22/dec/2022 at 14h15 CET)
codex* (added on 22/dec/2022 at 14h15 CET) (added on 22/dec/2022 at 14h15 CET)
codex*.*.* (added on 22/dec/2022 at 14h15 CET)
ets* (added on 3/mar/2023 at 11h20 CET)
* (added on 6/jan/2023 at 10h37 CET)
* naric*.onderwijs* (added on 7/dec/2022 at 15h15 CET)
_* _ .naric . *.onderwijs* (added on 7/dec/2022 at 15h15 CET)
opendata* (added on 22/dec/2022 at 14h15 CET)
*.opendata* (added on 22/dec/2022 at 14h15 CET)


  • Any domain that is not listed in the Domains section, is out of scope for this program (non-exhaustive list of out of scope domains)
  • Third party services are out of scope (only misconfigurations are in scope)
  • You can login, but the authentication flow is not in scope of this domain.


  • Wordpress usernames disclosure
  • Pre-Auth Account takeover/OAuth squatting
  • Self-XSS that cannot be used to exploit other users
  • Verbose messages/files/directory listings without disclosing any sensitive information
  • CORS misconfiguration on non-sensitive endpoints
  • Missing cookie flags
  • Missing security headers
  • Cross-site Request Forgery with no or low impact
  • Presence of autocomplete attribute on web forms
  • Reverse tabnabbing
  • Bypassing rate-limits or the non-existence of rate-limits.
  • Best practices violations (password complexity, expiration, re-use, etc.)
  • Clickjacking without proven impact/unrealistic user interaction
  • CSV Injection
  • Sessions not being invalidated (logout, enabling 2FA, etc.)
  • Tokens leaked to third parties
  • Anything related to email spoofing, SPF, DMARC or DKIM
  • Content injection without being able to modify the HTML
  • Username/email enumeration
  • Email bombing
  • HTTP Request smuggling without any proven impact
  • Homograph attacks
  • XMLRPC enabled
  • Banner grabbing/Version disclosure
  • Not stripping metadata of files
  • Same-site scripting
  • Subdomain takeover without taking over the subdomain
  • Arbitrary file upload without proof of the existence of the uploaded file
  • Blind SSRF without proven business impact (pingbacks are not sufficient)
  • Disclosed/misconfigured Google Maps API keys
  • Host header injection without proven business impact


  • In case that a reported vulnerability was already known to the company from their own tests, it will be flagged as a duplicate
  • Theoretical security issues with no realistic exploit scenario(s) or attack surfaces, or issues that would require complex end user interactions to be exploited
  • Spam, social engineering and physical intrusion
  • DoS/DDoS attacks or brute force attacks
  • Vulnerabilities that only work on software that no longer receive security updates
  • Attacks requiring physical access to a victim's computer/device, man in the middle or compromised user accounts
  • Recently discovered zero-day vulnerabilities found in in-scope assets within 14 days after the public release of a patch or mitigation may be reported, but are usually not eligible for a bounty
  • Reports that state that software is out of date/vulnerable without a proof-of-concept
Severity assessment

This program follows Intigriti's contextual CVSS standard


Where can we get credentials for the app?
You can log on via by clicking on "Meld u aan". This will redirect you to . Here you need to select an INSZ (= the account) and click on "Login". Multiple testing accounts are available.

Will you get recognition for relaying vulnerabilities?
We will create a section on our website, where we can mention your name or alias and the number of vulnerabilities you relayed to us.

All aboard!
Please log in or sign up on the platform

For obvious reasons we can only allow submissions or applications for our program with a valid Intigriti account.

It will only take 2 minutes to create a new one or even less to log in with an existing account, so don't hesitate and let's get started. We would be thrilled to have you as part of our community.

last contributors
Overall stats
submissions received
average payout
accepted submissions
total payouts
Last 90 day response times
avg. time first response
< 2 days
avg. time to decide
< 2 weeks
avg. time to triage
< 2 days
Digitaal Vlaanderen
closed a submission
Digitaal Vlaanderen
closed a submission
created a submission
created a submission
Digitaal Vlaanderen
accepted a submission
Digitaal Vlaanderen
closed a submission
created a submission
Digitaal Vlaanderen
accepted a submission
Digitaal Vlaanderen
closed a submission
created a submission