HackerOne · Bug Bounty

Amazon Vulnerability Research Program - Devices Bug Bounty Program

Complete guide to Amazon Vulnerability Research Program - Devices's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Amazon Vulnerability Research Program - Devices runs a bug bounty program on HackerOne. The program has 33 in-scope assets and is managed by HackerOne's triage team.

33
In-Scope Assets
15h
Avg Response
81%
Efficiency
18d
Avg Bounty Time
237d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
1324809509APPLE_STORE_APP_IDCriticalBounty
1528364633APPLE_STORE_APP_IDCriticalBounty
302584613APPLE_STORE_APP_IDCriticalBounty
621574163APPLE_STORE_APP_IDCriticalBounty
944011620APPLE_STORE_APP_IDCriticalBounty
947984433APPLE_STORE_APP_IDCriticalBounty
Echo Family DevicesHARDWARECriticalBounty
FireTVHARDWARECriticalBounty
Kindle E-ReaderHARDWARECriticalBounty
LunaHARDWARECriticalBounty
OtherOTHERCriticalNo Bounty
TabletsHARDWARECriticalBounty
a4k.amazon.comURLCriticalBounty
alexa.amazon.comURLCriticalBounty
alexaanswers.amazon.comURLCriticalBounty
amazon.com/hz/mycd/*URLCriticalBounty
api.amazonalexa.com/*URLCriticalBounty
blueprints.amazon.comURLCriticalBounty
com.amazon.clouddrive.photosGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.dee.alexaonwearosGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.dee.appGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.kindleGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.storm.lightning.client.aospGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.tahoe.freetimeGOOGLE_PLAY_APP_IDCriticalBounty
com.amazon.tailsGOOGLE_PLAY_APP_IDCriticalBounty
creator.amazon.comURLCriticalBounty
developer.amazon.com/alexa/*URLCriticalBounty
developer.amazon.com/apps-and-games/*URLCriticalBounty
https://luna.amazon.com/*URLCriticalBounty
https://www.amazon.com/luna/*URLCriticalBounty
read.amazon.comURLCriticalBounty
skills-store.amazon.comURLCriticalBounty
www.amazon.com/photos/*URLCriticalBounty

Out-of-Scope Assets

  • "Contact Us" Functionality
  • Devices
  • Services and Apps

Tips for Hacking Amazon Vulnerability Research Program - Devices

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Amazon Vulnerability Research Program - Devices?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Amazon Vulnerability Research Program - Devices pay bounties?

Yes, Amazon Vulnerability Research Program - Devices offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Amazon Vulnerability Research Program - Devices accept?

Amazon Vulnerability Research Program - Devices accepts reports for vulnerabilities found in their 33 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.