HackerOne · Bug Bounty

Eternal Bug Bounty Program

Complete guide to Eternal's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Eternal runs a bug bounty program on HackerOne. The program has 34 in-scope assets.

34
In-Scope Assets
1h
Avg Response
100%
Efficiency
6h
Avg Bounty Time
9d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.district.inWILDCARDCriticalBounty
*.edition.inWILDCARDCriticalBounty
*.eternal.comWILDCARDCriticalBounty
*.hyperpure.comWILDCARDCriticalBounty
*.insider.inWILDCARDCriticalBounty
*.runnr.inWILDCARDCriticalBounty
*.ticketnew.comWILDCARDCriticalBounty
*.tktnew.comWILDCARDCriticalBounty
*.zdev.netWILDCARDCriticalBounty
*.zomans.comWILDCARDCriticalBounty
*.zomato.comWILDCARDCriticalBounty
434613896APPLE_STORE_APP_IDCriticalBounty
6670203019APPLE_STORE_APP_IDCriticalBounty
6670536058APPLE_STORE_APP_IDCriticalBounty
960335206APPLE_STORE_APP_IDCriticalBounty
All Assets (other than Blinkit)OTHERCriticalBounty
Data Protection ProgramOTHERCriticalBounty
Scope Questions: Items not explicitly listed hereOTHERCriticalNo Bounty
Tier 1OTHERCriticalBounty
Tier 2OTHERCriticalBounty
Tier 3OTHERCriticalBounty
api.grofers.comURLCriticalBounty
api2.grofers.comURLCriticalBounty
bistro-api.blinkit.comURLCriticalBounty
blinkit.comURLCriticalBounty
com.application.zomatoGOOGLE_PLAY_APP_IDCriticalBounty
com.application.zomato.districtGOOGLE_PLAY_APP_IDCriticalBounty
com.application.zomatomerchantGOOGLE_PLAY_APP_IDCriticalNo Bounty
com.blinkit.bistroGOOGLE_PLAY_APP_IDCriticalBounty
com.grofers.customerappGOOGLE_PLAY_APP_IDCriticalBounty
http://*.grofer.ioWILDCARDCriticalBounty
http://*.grofers.comWILDCARDCriticalBounty
https://mcp-server.zomato.com/mcpURLCriticalBounty
winecellar.zomato.comURLCriticalBounty

Out-of-Scope Assets

  • *.ali.zomans.com
  • *.bstro.io
  • *.zomatoportugal.com
  • blog.zomato.com
  • business-blog.zomato.com
  • com.application.zomato.ordering
  • community.zomato.com
  • dev.hyperpure.com
  • devapi.hyperpure.com
  • devpod.hyperpure.com
  • http://*.blinkit.support
  • send.zomato.com
  • staging*.runnr.in
  • success.zomato.com
  • www.zomatobook.com

Tips for Hacking Eternal

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Eternal?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Eternal pay bounties?

Yes, Eternal offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Eternal accept?

Eternal accepts reports for vulnerabilities found in their 34 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.