HackerOne · Bug Bounty

Cloudflare Public Bug Bounty Bug Bounty Program

Complete guide to Cloudflare Public Bug Bounty's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Cloudflare Public Bug Bounty runs a bug bounty program on HackerOne. The program has 53 in-scope assets and is managed by HackerOne's triage team.

53
In-Scope Assets
3h
Avg Response
82%
Efficiency
20d
Avg Bounty Time

In-Scope Assets

AssetTypeMax SeverityEligible
*.cloudflare.comURLCriticalBounty
*.cloudflarepartners.comOTHERCriticalBounty
*.teams.cloudflare.comURLCriticalBounty
1.1.1.1 ResolverOTHERCriticalBounty
AI GatewayOTHERCriticalBounty
AMP Real URLOTHERCriticalBounty
API ShieldOTHERCriticalBounty
Area 1OTHERCriticalBounty
Bot ManagementOTHERCriticalBounty
Browser IsolationOTHERCriticalBounty
CDNJSOTHERCriticalBounty
China NetworkOTHERCriticalBounty
Cloudflare AccessOTHERCriticalBounty
Cloudflare AnalyticsOTHERCriticalBounty
Cloudflare CASBOTHERCriticalBounty
Cloudflare Cache OTHERCriticalBounty
Cloudflare D1OTHERCriticalBounty
Cloudflare DNSOTHERCriticalBounty
Cloudflare Durable ObjectsOTHERCriticalBounty
Cloudflare PagesOTHERCriticalBounty
Cloudflare R2OTHERCriticalBounty
Cloudflare TunnelOTHERCriticalBounty
Cloudflare Workers CIOTHERCriticalBounty
Cloudflare ZarazOTHERCriticalBounty
Cloudflare Zero Trust/Cloudflare OneOTHERCriticalBounty
Data Loss Prevention (DLP)OTHERCriticalBounty
GatewayOTHERCriticalBounty
HyperdriveOTHERCriticalBounty
ImagesOTHERNoneBounty
Load BalancingOTHERCriticalBounty
Magic FirewallOTHERCriticalBounty
Magic TransitOTHERCriticalBounty
Magic WANOTHERCriticalBounty
Open source tools from CloudflareOTHERCriticalBounty
SSL/TLSOTHERCriticalBounty
SpectrumOTHERCriticalBounty
StreamOTHERCriticalBounty
TurnstileOTHERCriticalBounty
VectorizeOTHERCriticalBounty
WARP Mobile AppsOTHERCriticalBounty
WARP desktop clientOTHERCriticalBounty
Waiting RoomOTHERCriticalBounty
WorkersOTHERCriticalBounty
Workers AIAI_MODELCriticalBounty
Workers KVOTHERCriticalBounty
api.cloudflare.comURLCriticalBounty
cloudflareworkers.comURLCriticalBounty
dash.cloudflare.comURLCriticalBounty
http://github.com/cloudflareURLCriticalBounty
https://github.com/cloudflare/vinextSOURCE_CODECriticalBounty

Showing 50 of 53 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • 172.65.0.0/16
  • community.cloudflare.com
  • events.www.cloudflare.com
  • https://github.com/cloudflare/vinext-private
  • support.cloudflare.com
  • support.cloudflarewarp.com

Tips for Hacking Cloudflare Public Bug Bounty

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Cloudflare Public Bug Bounty?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Cloudflare Public Bug Bounty pay bounties?

Yes, Cloudflare Public Bug Bounty offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Cloudflare Public Bug Bounty accept?

Cloudflare Public Bug Bounty accepts reports for vulnerabilities found in their 53 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.