HackerOne · VDP

MOD Supply Chain VDP Vulnerability Disclosure Program

Complete guide to MOD Supply Chain VDP's vulnerability disclosure program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

MOD Supply Chain VDP runs a vulnerability disclosure program on HackerOne. The program has 181 in-scope assets.

181
In-Scope Assets
9h
Avg Response
96%
Efficiency
11d
Avg Resolve

In-Scope Assets

AssetTypeMax SeverityEligible
*.roke.co.ukWILDCARDCriticalNo Bounty
194.73.139.0/27CIDRCriticalNo Bounty
194.73.181.160/29CIDRCriticalNo Bounty
194.73.181.176/28CIDRCriticalNo Bounty
194.73.181.248/29CIDRCriticalNo Bounty
194.73.90.96/27CIDRCriticalNo Bounty
195.99.217.224/28CIDRCriticalNo Bounty
20.49.171.93IP_ADDRESSCriticalNo Bounty
212.20.255.225IP_ADDRESSCriticalNo Bounty
212.20.255.54IP_ADDRESSCriticalNo Bounty
212.20.255.58IP_ADDRESSCriticalNo Bounty
217.38.165.25/29CIDRCriticalNo Bounty
51.11.122.92IP_ADDRESSCriticalNo Bounty
62.64.198.48/28CIDRCriticalNo Bounty
62.64.199.120/29CIDRCriticalNo Bounty
78.32.246.234IP_ADDRESSCriticalNo Bounty
78.33.231.186IP_ADDRESSCriticalNo Bounty
81.128.141.138IP_ADDRESSLowNo Bounty
81.128.180.192/26CIDRCriticalNo Bounty
85.159.210.14IP_ADDRESSCriticalNo Bounty
86.188.129.9/29CIDRCriticalNo Bounty
86.188.184.67IP_ADDRESSCriticalNo Bounty
IP range 194.74.25.97 - 194.74.25.110OTHERCriticalNo Bounty
IP range 216.87.55.1 - 216.87.55.254OTHERCriticalNo Bounty
IP range 217.33.241.33 - 217.33.241.62OTHERCriticalNo Bounty
IP range 62.172.162.48 - 62.172.162.63OTHERCriticalNo Bounty
IP range 81.128.176.1 - 81.128.176.62OTHERCriticalNo Bounty
IP range 81.128.180.193 - 81.128.180.254OTHERCriticalNo Bounty
accessto.l3harris.comURLCriticalNo Bounty
ardeinc.comURLCriticalNo Bounty
autodiscover.thorntontomasetti.comURLCriticalNo Bounty
ballastcalc.thorntontomasetti.comURLCriticalNo Bounty
careers.thorntontomasetti.comURLCriticalNo Bounty
corporateresponsibility.thorntontomasetti.comURLCriticalNo Bounty
crm.thorntontomasetti.comURLCriticalNo Bounty
data.intelliearthmaritime.l3harris.comURLCriticalNo Bounty
draken.aeroURLCriticalNo Bounty
drumgrange.comURLCriticalNo Bounty
eagle.wsots.netURLCriticalNo Bounty
em5260.careeralerts.thorntontomasetti.comURLCriticalNo Bounty
em793.jobalerts.thorntontomasetti.comURLCriticalNo Bounty
ember.thorntontomasetti.comURLCriticalNo Bounty
emea-vpn-1.l3harris.comURLCriticalNo Bounty
encounter.thorntontomasetti.comURLCriticalNo Bounty
enterpriseregistration.thorntontomasetti.comURLCriticalNo Bounty
explore.l3harris.comURLCriticalNo Bounty
fileshare.thorntontomasetti.comURLCriticalNo Bounty
filex.thorntontomasetti.comURLCriticalNo Bounty
fimportal.thorntontomasetti.comURLCriticalNo Bounty
ftp.drumgrange.comURLCriticalNo Bounty

Showing 50 of 181 in-scope assets. View all on HackerOne.

Out-of-Scope Assets

  • *.cas.l3harris.com
  • *.cts.l3harris.com
  • 212.84.174.56
  • 81.139.47.64/28
  • asterisk.thorntontomasetti.com
  • careers.draken.aero
  • coresso.thorntontomasetti.com
  • defenceshare.mod.uk
  • devops.cts.l3harris.com
  • healthyreentry.thorntontomasetti.com
  • http://coresso.thorntontomasetti.com
  • http://healthyreentry.thorntontomasetti.com
  • http://mirar.thorntontomasetti.com
  • http://thread.thorntontomasetti.com
  • recruitment.roke.co.uk
  • software.cts.l3harris.com
  • swarm.thorntontomasetti.com
  • thread.thorntontomasetti.com
  • tms.l3commercialaviation.com

Tips for Hacking MOD Supply Chain VDP

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking MOD Supply Chain VDP?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does MOD Supply Chain VDP pay bounties?

No, MOD Supply Chain VDP runs a Vulnerability Disclosure Program (VDP) without monetary rewards. You may receive recognition or swag.

What types of vulnerabilities does MOD Supply Chain VDP accept?

MOD Supply Chain VDP accepts reports for vulnerabilities found in their 181 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.