Daily, Incredible Offers.

Unbelievable deals and Huge discounts!
View the current offers

Host.ag Bug Bounty Program

We consider the security of our systems a top priority. It is understood that no system is perfect and there can always be flaws in a techonolgy. We are looking forward to working with skilled security researchers to protect our customers.

If you believe you have identified a security issue in our product or service, we encourage you to notify us.

Guidelines for responsible disclosure

  • Let us know as soon as possible upon discovery of a potential security issue, and we will make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • No unauthorized impersonation: any unauthorized attempts to socially engineer another party through impersonation of a Host.ag employee, another hacker, or a security team will not be tolerated.
  • If you comply with all conditions set in the guidelines, we will not take any legal action against you regarding this report.
  • Your report will be confidential, we will not share your personal information with third parties without prior consent, unless this is necessary to comply with a legal obligation.


To show our appreciation of responsible security researchers, Host.ag offers bounties for reports of qualifying security vulnerabilities. Bounties will be awarded in the form of financial compensation(s) or Host.ag merchandise. The amount that is rewarded per bounty is at discretion of Host.ag and will be based on the internal severity rating of the disclosed vulnerability. The bounty will be communicated after validation of the security vulnerability by our internal teams.


To qualify for a reward, you must:

  1. Be the first reporter of the vulnerability.
  2. Follow the guidelines as described on this page.
  3. Not publicly disclose the vulnerability prior to our resolution.
  4. Provide a working proof of concept that exploits the security issue
  5. Solely use your created accounts and not access data of other users
  6. Not be an inhabitant of any country listed on the Specially Designated Nationals and Blocked Persons (SDN) list
  7. Not be an inhabitant of any country listed on the Consolidated List of persons, groups and entities subject to EU Financial Sanctions list.

Absolute Exclusions

  • Social engineering (including phishing)
  • Any physical attempts against Host.ag property or data centers
  • Physical attack on the infrastructure
  • Denial of service
  • CSRF
  • Self-XSS
  • Miss of rate limits
  • Report from automated tools and scans
  • Bugs in 3rd party software
  • X-Frame-Options related
  • Missing cookie flags
  • Missing security headers which do not lead directly to a vulnerability
  • DKIM/SPF/DMARC issues
  • Version exposure
  • Directory listing
  • Content spoofing on error pages or text injection
  • Clickjacking and issues only exploitable through clickjacking.
  • Any kind of Browser vulnerabilities
  • Homograph attacks
  • Weak Captcha / Captcha Bypass
  • Cache related issues
  • Authentication session timeouts (it's IP bound and has a 1h timeout)
  • Any attack that comes from having access to the user's computer (physical or remote)
  • OPTIONS HTTP method enabled
  • Open redirects
  • Brute forcing
  • User enumeration by brute force
  • Wordpress vulnerabilities
  • SSL Issues
  • Password policy
  • 2FA Activation without email confirmation
  • Server IP Disclosure
  • Missing noreferer, noopener
  • Parameter tampering for payment processors
  • Password verification on email change or 2FA

Due to the large amount of invalid reports, there won't be any replies for any reports which contain a vulnerability listed on our exclusions list.

How to report

Please send your initial findings to security@belcloud.net.