HackerOne · Bug Bounty

8x8 Bug Bounty Program

Complete guide to 8x8's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

8x8 runs a bug bounty program on HackerOne. The program has 101 in-scope assets.

101
In-Scope Assets
1h
Avg Response
100%
Efficiency
2d
Avg Bounty Time
23d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*-vpn.8x8.comWILDCARDHighNo Bounty
*.8x8.co.ukWILDCARDCriticalNo Bounty
*.8x8.comWILDCARDCriticalNo Bounty
*.8x8.idWILDCARDCriticalNo Bounty
*.8x8.ukWILDCARDCriticalNo Bounty
*.8x8.vcWILDCARDCriticalBounty
*.8x8cloud.netWILDCARDCriticalBounty
*.8x8e2e.comWILDCARDCriticalNo Bounty
*.8x8hosts.internalWILDCARDMediumNo Bounty
*.8x8hosts.pilotWILDCARDMediumNo Bounty
*.8x8pilot.comWILDCARDMediumNo Bounty
*.8x8staging.comWILDCARDCriticalBounty
*.8x8testa.comWILDCARDMediumNo Bounty
*.8x8testb.comWILDCARDMediumNo Bounty
*.acceptance.cloud.8x8.comWILDCARDHighNo Bounty
*.ai.8x8.vcWILDCARDMediumNo Bounty
*.call-control.ieWILDCARDCriticalNo Bounty
*.cceng.8x8.comWILDCARDMediumNo Bounty
*.chalet.8x8.comWILDCARDCriticalBounty
*.fuze.comWILDCARDLowNo Bounty
*.fuze.siteWILDCARDLowNo Bounty
*.in2tel.ieWILDCARDCriticalNo Bounty
*.jit.siWILDCARDCriticalBounty
*.jitsi.netWILDCARDCriticalBounty
*.ociadmin.cloud.8x8.comWILDCARDHighNo Bounty
*.p8t.usWILDCARDCriticalBounty
*.packet8-pilot.netWILDCARDMediumNo Bounty
*.preview.8x8.vcWILDCARDMediumNo Bounty
*.prod.cloud.8x8.comWILDCARDCriticalNo Bounty
*.staging.cloud.8x8.comWILDCARDMediumNo Bounty
*.thinkingphones.comWILDCARDCriticalNo Bounty
*.thinkingphones.netWILDCARDCriticalNo Bounty
*.ucverse.comWILDCARDCriticalNo Bounty
*.unreal-agents.comWILDCARDMediumNo Bounty
*.unreal-agents.jitsi.netWILDCARDMediumNo Bounty
*.wavecell.comWILDCARDCriticalBounty
8x8 Communication APIsAPICriticalBounty
8x8 Partner PortalOTHERHighNo Bounty
8x8-workAPPLE_STORE_APP_IDCriticalNo Bounty
8x8.my.site.comURLHighNo Bounty
ASN: AS10976OTHERLowNo Bounty
ASN: AS133144OTHERCriticalNo Bounty
ASN: AS13896OTHERLowNo Bounty
ASN: AS14294OTHERLowNo Bounty
ASN: AS198554OTHERCriticalNo Bounty
ASN: AS199687OTHERCriticalNo Bounty
ASN: AS206422OTHERCriticalNo Bounty
ASN: AS32308OTHERCriticalNo Bounty
ASN: AS395362OTHERCriticalNo Bounty
ASN: AS398067OTHERCriticalNo Bounty

Showing 50 of 101 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • *.bell.ca
  • *.mavenlab.com
  • *.moobicast.com
  • *.moobidesk.com
  • *.msteams.8x8.com
  • 8x8-meeting-rooms
  • 8x8.wavecell.com
  • Jitsi Meet Desktop
  • accountmanager.8x8.com
  • com.atlassian.JitsiMeet.ios
  • com.spot8x8.spot
  • express.8x8.com
  • feedback.wavecell.com
  • get8x8.com
  • http://*.callstats.io
  • http://*.contactnow.8x8.com
  • http://*.jitsi.org
  • http://*.sameroom.io
  • investors.8x8.com
  • mobileidentity.8x8.com

Tips for Hacking 8x8

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking 8x8?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does 8x8 pay bounties?

Yes, 8x8 offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does 8x8 accept?

8x8 accepts reports for vulnerabilities found in their 101 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.