HackerOne · VDP

AWS VDP Vulnerability Disclosure Program

Complete guide to AWS VDP's vulnerability disclosure program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

AWS VDP runs a vulnerability disclosure program on HackerOne. The program has 558 in-scope assets and is managed by HackerOne's triage team.

558
In-Scope Assets
1d
Avg Response
61%
Efficiency
31d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.agscollab.comOTHERCriticalNo Bounty
*.agslauncher.comOTHERCriticalNo Bounty
*.amazongames.comOTHERCriticalNo Bounty
*.aws.devOTHERCriticalNo Bounty
*.cloudendure.comOTHERCriticalNo Bounty
*.gaming.amazon.comOTHERCriticalNo Bounty
*.lambda-url.*.on.awsOTHERCriticalNo Bounty
*.lostark.games.aws.devWILDCARDHighNo Bounty
*.newworld.comOTHERCriticalNo Bounty
*.people.aws.comOTHERLowNo Bounty
*.people.aws.devOTHERLowNo Bounty
*.sa.aws.devOTHERNoneNo Bounty
*.tsologic.comOTHERCriticalNo Bounty
*.workshops.aws.devOTHERMediumNo Bounty
1023499075APPLE_STORE_APP_IDCriticalNo Bounty
AWS - Cloud ShellOTHERCriticalNo Bounty
AWS Account ManagementOTHERCriticalNo Bounty
AWS ActivateOTHERCriticalNo Bounty
AWS AmplifyOTHERCriticalNo Bounty
AWS App MeshOTHERCriticalNo Bounty
AWS App RunnerOTHERCriticalNo Bounty
AWS App StudioOTHERCriticalNo Bounty
AWS App2ContainerOTHERCriticalNo Bounty
AWS AppConfigOTHERCriticalNo Bounty
AWS AppFabricOTHERCriticalNo Bounty
AWS AppSyncOTHERCriticalNo Bounty
AWS Application Auto ScalingOTHERCriticalNo Bounty
AWS Application ComposerOTHERCriticalNo Bounty
AWS Application Cost ProfilerOTHERCriticalNo Bounty
AWS Application Cost Profiler ServiceOTHERCriticalNo Bounty
AWS Application Discovery ServiceOTHERCriticalNo Bounty
AWS Application Migration ServiceOTHERCriticalNo Bounty
AWS Application Transformation ServiceOTHERCriticalNo Bounty
AWS ArtifactOTHERCriticalNo Bounty
AWS Audit ManagerOTHERCriticalNo Bounty
AWS Auto ScalingOTHERCriticalNo Bounty
AWS B2B Data InterchangeOTHERCriticalNo Bounty
AWS Backint AgentOTHERCriticalNo Bounty
AWS BackupOTHERCriticalNo Bounty
AWS BatchOTHERCriticalNo Bounty
AWS BillingOTHERCriticalNo Bounty
AWS Billing and Cost ManagementOTHERCriticalNo Bounty
AWS Blockchain TemplatesOTHERCriticalNo Bounty
AWS Budget ServiceOTHERCriticalNo Bounty
AWS BugBustOTHERCriticalNo Bounty
AWS Builder IDOTHERCriticalNo Bounty
AWS Certificate ManagerOTHERCriticalNo Bounty
AWS Certificate Manager (ACM)OTHERCriticalNo Bounty
AWS ChaliceOTHERCriticalNo Bounty
AWS ChatbotOTHERCriticalNo Bounty

Showing 50 of 558 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • https://*.amazonaws.com/*

Tips for Hacking AWS VDP

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking AWS VDP?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does AWS VDP pay bounties?

No, AWS VDP runs a Vulnerability Disclosure Program (VDP) without monetary rewards. You may receive recognition or swag.

What types of vulnerabilities does AWS VDP accept?

AWS VDP accepts reports for vulnerabilities found in their 558 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.