HackerOne · Bug Bounty

Kubernetes Bug Bounty Program

Complete guide to Kubernetes's bug bounty program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Kubernetes runs a bug bounty program on HackerOne. The program has 82 in-scope assets and is managed by HackerOne's triage team.

82
In-Scope Assets
17h
Avg Response
67%
Efficiency
45d
Avg Bounty Time
45d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
Community Management & CommunicationsOTHERCriticalNo Bounty
Tier 1OTHERCriticalBounty
Tier 2OTHERCriticalBounty
Tier 3OTHERCriticalBounty
github.com/kubernetes-csiSOURCE_CODECriticalBounty
github.com/kubernetes-retiredSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes-clientSOURCE_CODECriticalBounty
https://github.com/kubernetes-incubatorSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes-securitySOURCE_CODECriticalBounty
https://github.com/kubernetes-sigsSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/apiSOURCE_CODECriticalBounty
https://github.com/kubernetes/apiextensions-apiserverSOURCE_CODECriticalBounty
https://github.com/kubernetes/apimachinerySOURCE_CODECriticalBounty
https://github.com/kubernetes/apiserverSOURCE_CODECriticalBounty
https://github.com/kubernetes/autoscalerSOURCE_CODECriticalBounty
https://github.com/kubernetes/cli-runtimeSOURCE_CODECriticalBounty
https://github.com/kubernetes/client-goSOURCE_CODECriticalBounty
https://github.com/kubernetes/cloud-providerSOURCE_CODECriticalBounty
https://github.com/kubernetes/cloud-provider-alibaba-cloudSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-awsSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-azureSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-gcpSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-openstackSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-sampleSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cloud-provider-vsphereSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/cluster-bootstrapSOURCE_CODECriticalBounty
https://github.com/kubernetes/cluster-registrySOURCE_CODECriticalBounty
https://github.com/kubernetes/code-generatorSOURCE_CODECriticalBounty
https://github.com/kubernetes/communitySOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/component-baseSOURCE_CODECriticalBounty
https://github.com/kubernetes/cri-apiSOURCE_CODECriticalBounty
https://github.com/kubernetes/csi-apiSOURCE_CODECriticalBounty
https://github.com/kubernetes/csi-translation-libSOURCE_CODECriticalBounty
https://github.com/kubernetes/dnsSOURCE_CODECriticalBounty
https://github.com/kubernetes/enhancementsSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/examplesSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/fraktiSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/fundingSOURCE_CODECriticalNo Bounty
https://github.com/kubernetes/gengoSOURCE_CODECriticalBounty
https://github.com/kubernetes/git-syncSOURCE_CODECriticalBounty
https://github.com/kubernetes/k8s.ioSOURCE_CODECriticalBounty
https://github.com/kubernetes/klogSOURCE_CODECriticalBounty
https://github.com/kubernetes/komposeSOURCE_CODECriticalBounty
https://github.com/kubernetes/kopsSOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-aggregatorSOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-controller-managerSOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-deploySOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-openapiSOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-proxySOURCE_CODECriticalBounty
https://github.com/kubernetes/kube-schedulerSOURCE_CODECriticalBounty

Showing 50 of 82 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • https://github.com/kubernetes/ingress-gce
  • https://github.com/kubernetes/ingress-nginx

Tips for Hacking Kubernetes

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Kubernetes?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Kubernetes pay bounties?

Yes, Kubernetes offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does Kubernetes accept?

Kubernetes accepts reports for vulnerabilities found in their 82 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.