mirror of
https://github.com/cloudflare/vinext.git
synced 2026-05-09 08:25:34 +02:00
[GH-ISSUE #66] Is vinext covered under Cloudflare's HackerOne bug bounty program? #18
Labels
No labels
enhancement
enhancement
good first issue
help wanted
nextjs-tracking
nextjs-tracking
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/vinext#18
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @0ni-x4 on GitHub (Feb 25, 2026).
Original GitHub issue: https://github.com/cloudflare/vinext/issues/66
Question
The SECURITY.md in this repo points to Cloudflare's HackerOne bug bounty program (https://hackerone.com/cloudflare) and states:
However, the README describes vinext as "experimental" and "an experiment in AI-driven software development," with the note:
Cloudflare's HackerOne program excludes:
The question
Does vinext (the framework itself, not the deployed example apps) fall under Cloudflare's bug bounty scope, or would it be classified as a "demo/test/PoC application" and excluded?
If it is in scope, would valid security findings in the framework code (e.g., CSRF bypasses, SSRF in the proxy layer, cache poisoning in the KV handler) be eligible for bounty consideration?
Asking before filing anything on HackerOne to avoid wasting both sides' time. Thanks!
@AlbertSPedersen commented on GitHub (Feb 25, 2026):
Hi @0ni-x4. This project is considered in-scope of our bug bounty program. If you can demonstrate a vulnerability that is realistically exploitable in a best practices production deployment of vinext, please report it to us via HackerOne (https://hackerone.com/cloudflare?type=team) so we can take a look.