mpb-bug-bounty-program

YesWeHackView on YesWeHack
RawAI Enhanced
5
In Scope
5
Out of Scope
In-Scope Assets (5)
Out-of-Scope Assets (5)
AssetCategoryBounty
All domains or subdomains not listed in the above list of 'Scopes'OTHERYes
Any manipulation of prices on the platform, before completing the checkout, may appear to allow the user to complete the transaction. However, we have mitigated this issue with backend/server side validation. Funds will be reserved on a payment card but never captured, the user will never receive the goods they attempted to purchase and the product will remain available to purchase. This issue will not be considered for a rewardOTHERYes
Exclude 3rd party integrations such as : Bloomreach, GoCertify, Contentful, Disqus, Elastic APM, Full Story, Google Analytics, Google Tag Manager, Intercom, Kameleoon, Loquate, Mention Me, One Trust, Pingdom, Trusted Shops, Trust PilotOTHERYes
Please do not test the Chat bot or intercom.helpOTHERYes
Please note that simply demonstrating the ability to gain access to sensitive systems or data is enough to validate a vulnerability; you are not authorised to interact with or manipulate the data in any way. Any unauthorised interaction with data will not be eligible for a reward.OTHERYes
Scope Changes (10)
Apr 16, 2026
ChangeAssetCategoryScopeTime
Addedhttps://mpb.comURLIn Scope18:33
Addedhttps://api.mpb.comURLIn Scope18:33
Addedhttps://flamingo.mpb.comURLIn Scope18:33
Addedhttps://swan.mpb.com/ANDROIDIn Scope18:33
Addednew feature releasesURLIn Scope18:33
Addedall domains or subdomains not listed in the above list of 'scopes'OTHEROut of Scope18:33
Addedplease do not test the chat bot or intercom.helpOTHEROut of Scope18:33
Addedexclude 3rd party integrations such as : bloomreach, gocertify, contentful, disqus, elastic apm, full story, google analytics, google tag manager, intercom, kameleoon, loquate, mention me, one trust, pingdom, trusted shops, trust pilotOTHEROut of Scope18:33
Addedany manipulation of prices on the platform, before completing the checkout, may appear to allow the user to complete the transaction. however, we have mitigated this issue with backend/server side validation. funds will be reserved on a payment card but never captured, the user will never receive the goods they attempted to purchase and the product will remain available to purchase. this issue will not be considered for a rewardOTHEROut of Scope18:33
Addedplease note that simply demonstrating the ability to gain access to sensitive systems or data is enough to validate a vulnerability; you are not authorised to interact with or manipulate the data in any way. any unauthorised interaction with data will not be eligible for a rewardOTHEROut of Scope18:33