HackerOne · Bug Bounty

Amazon Vulnerability Research Program Bug Bounty Program

Complete guide to Amazon Vulnerability Research Program's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Amazon Vulnerability Research Program runs a bug bounty program on HackerOne. The program has 100 in-scope assets and is managed by HackerOne's triage team.

100
In-Scope Assets
11h
Avg Response
98%
Efficiency
14d
Avg Bounty Time
86d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.amazon.aeWILDCARDCriticalBounty
*.amazon.caWILDCARDCriticalBounty
*.amazon.clWILDCARDCriticalBounty
*.amazon.cnWILDCARDCriticalBounty
*.amazon.co.jpWILDCARDCriticalBounty
*.amazon.co.ukWILDCARDCriticalBounty
*.amazon.co.zaWILDCARDCriticalBounty
*.amazon.comWILDCARDCriticalBounty
*.amazon.com.auWILDCARDCriticalBounty
*.amazon.com.beWILDCARDCriticalBounty
*.amazon.com.brWILDCARDCriticalBounty
*.amazon.com.coWILDCARDCriticalBounty
*.amazon.com.mxWILDCARDCriticalBounty
*.amazon.com.ngWILDCARDCriticalBounty
*.amazon.com.trWILDCARDCriticalBounty
*.amazon.deWILDCARDCriticalBounty
*.amazon.egWILDCARDCriticalBounty
*.amazon.esWILDCARDCriticalBounty
*.amazon.frWILDCARDCriticalBounty
*.amazon.inWILDCARDCriticalBounty
*.amazon.itWILDCARDCriticalBounty
*.amazon.nlWILDCARDCriticalBounty
*.amazon.plWILDCARDCriticalBounty
*.amazon.saWILDCARDCriticalBounty
*.amazon.seWILDCARDCriticalBounty
*.amazon.sgWILDCARDCriticalBounty
1057338687APPLE_STORE_APP_IDCriticalBounty
1151746202APPLE_STORE_APP_IDCriticalBounty
1265170914APPLE_STORE_APP_IDCriticalBounty
1276296103APPLE_STORE_APP_IDCriticalBounty
1454725763APPLE_STORE_APP_IDCriticalBounty
1475021574APPLE_STORE_APP_IDCriticalBounty
1478350915APPLE_STORE_APP_IDCriticalBounty
1494755014APPLE_STORE_APP_IDCriticalBounty
1498197033APPLE_STORE_APP_IDCriticalBounty
1532153219APPLE_STORE_APP_IDCriticalBounty
1552455423APPLE_STORE_APP_IDCriticalBounty
1579372261APPLE_STORE_APP_IDCriticalBounty
1592204907APPLE_STORE_APP_IDCriticalBounty
1659883691APPLE_STORE_APP_IDCriticalBounty
297606951APPLE_STORE_APP_IDCriticalBounty
335187483APPLE_STORE_APP_IDCriticalBounty
342576766APPLE_STORE_APP_IDCriticalBounty
348712880APPLE_STORE_APP_IDCriticalBounty
358861688APPLE_STORE_APP_IDCriticalBounty
374254473APPLE_STORE_APP_IDCriticalBounty
510855668APPLE_STORE_APP_IDCriticalBounty
545519333APPLE_STORE_APP_IDCriticalBounty
6444868926APPLE_STORE_APP_IDCriticalBounty
6452192521APPLE_STORE_APP_IDCriticalBounty

Showing 50 of 100 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • "Contact Us" Functionality
  • *.*a2z*.*
  • *.aws.*
  • *.dev
  • AWS and AWS customer assets are strictly out of scope
  • Amazon Web Services (AWS)
  • Anything considered a non-prod asset
  • Anything which redirects to AWS
  • amazongames.com
  • learning.logistics.amazon.com

Tips for Hacking Amazon Vulnerability Research Program

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Amazon Vulnerability Research Program?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Amazon Vulnerability Research Program pay bounties?

Yes, Amazon Vulnerability Research Program offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Amazon Vulnerability Research Program accept?

Amazon Vulnerability Research Program accepts reports for vulnerabilities found in their 100 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.