The Groupize Bug Bounty Program is designed to provide reasonable compensation and incentive to report qualifying vulnerabilities that independent researchers identify with Groupize’s suite of products. Additionally the rules outlined in this program should help to guide the areas of our technical footprint that are eligible for, and ineligible for the payment of a bounty.
In short – we accept vulnerability reports for any publicly-exploitable and, as of yet unidentified, issue with our main suite of products. We do not accept reports for vulnerabilities related to our marketing platforms or websites, including groupize.com, or for base DNS or email configuration.
Security researchers may participate in the Groupize Bug Bounty Program by emailing [email protected]. Please include your name and contact information, the details of the issue you are reporting and any additional information about the vulnerability as you are able to provide. Groupize reserves the right to refuse participant’s requests without sufficient information.
We do not issue test accounts or credentials for independent security researchers. Should an individual identify a method of access, we encourage that to be reported but we reserve the right to then disable that account.
The scope of this program is currently limited to our main application: app.groupize.com
groupize.com, groupizesolutions.com and other websites primarily used for marketing are ineligible for participation in this program.
memo.thevendry.com is not eligible for participation in this program, nor is any wordpress based application owned or operated by Groupize.
We accept and welcome reports for thevendry.com, however all exclusions listed below apply and we reserve the right to reject any submission for eligibility in compensation until we can assess the impact of the report.
The following vulnerabilities are not eligible for bounty:
You may be eligible to receive a monetary reward if:
All bounty amounts will be determined at the discretion of the Groupize engineering team who will evaluate each report for severity, impact, and quality. Rewards amounts vary depending upon the severity of the vulnerability reported. There could be submissions that we determine have an acceptable level of risk such that we do not make changes.
The bounty amount for a validated bug submission is $50 USD. Groupize retains the right to determine if the bug submitted to the Bug Bounty Program is eligible. All determinations as to bounty eligibility are final.
All payments must meet the legal requirements of the United States, the state of Massachusetts and the local laws of the bounty reporter. US-based reporters may require an invoice-based reporting mechanism at a certain threshold. If that applies you will be notified.
Non-invoice payments can be made via paypal – the reporter is responsible for providing an eligible paypal account.
We do not currently support payment via western union, crypto-currency or other alternative payment mechanisms.
It’s important to include at least the following information in the email:
We will investigate legitimate reports and make every effort to quickly correct any vulnerability. A well written report will allow us to more quickly and accurately triage your submission.
There are constraints on who may participate in the Groupize Bug Bounty Program (the “Program”). In addition, there may be additional restrictions depending upon applicable local laws.
Any information you receive or collect about Groupize through the Bug Bounty Program must be kept confidential and only used in connection with the Bug Bounty Program. You may not use, disclose or distribute any such Confidential Information, including, but not limited to, any information regarding your Submission and information you obtain when researching the Groupize sites, without Groupize’s prior written consent.
Join over 150,000 planners who trust Groupize to simplify meetings of all sizes—book a demo today and explore our global marketplace of venues and vendors to see how we can transform your planning process from start to finish.