HackerOne · Bug Bounty

inDrive Bug Bounty Program

Complete guide to inDrive's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

inDrive runs a bug bounty program on HackerOne. The program has 118 in-scope assets.

118
In-Scope Assets
20h
Avg Response
100%
Efficiency
5d
Avg Bounty Time
64d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.indrive.comWILDCARDHighBounty
*.indriver.comWILDCARDMediumBounty
*.indriverapp.comWILDCARDCriticalBounty
ab-api-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
ab-platform-api.eu-east-1.indriverapp.comURLCriticalBounty
alternativa.filmURLHighBounty
api-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
api.ryadom.kzURLCriticalBounty
as-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
as-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
ath-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
ath-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
auroratechaward.comURLHighBounty
baf-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
bdu-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
bid.*.aws.indriverapp.comWILDCARDCriticalBounty
blog.indrive.comURLCriticalBounty
careers.indrive.comURLCriticalBounty
cargo.indrive.comURLCriticalBounty
cas-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
cht-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
cht-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
co-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
co-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
co-in-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
coaching.supernovas.indrive.comURLCriticalBounty
courier-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
couriers.indrive.comURLCriticalBounty
debug.clairvoyance.indrive.techURLCriticalBounty
delivery-webview.indrive.comURLCriticalBounty
dh-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
dr-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
es-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
es-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
external.indrive.devURLCriticalBounty
fch-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
fe-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
fe-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
file-storage-front.eu-east-1.indriverapp.comURLCriticalBounty
g2-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
g2-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
gt-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
gt-gw-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
gvt-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
https://*.indriver.ioWILDCARDCriticalBounty
https://cas-cf.euce1.indriverapp.com/api/passkeyURLCriticalBounty
ic3.*.indriverapp.comWILDCARDCriticalBounty
icl-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
idp-cf.*.aws.indriverapp.comWILDCARDCriticalBounty
in-cf.*.aws.indriverapp.comWILDCARDCriticalBounty

Showing 50 of 118 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • bus.*.indrive.com
  • servicos.indrive.com
  • sinet.startup.inDriver
  • super-services.indriverapp.com

Tips for Hacking inDrive

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking inDrive?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does inDrive pay bounties?

Yes, inDrive offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does inDrive accept?

inDrive accepts reports for vulnerabilities found in their 118 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.