HackerOne · VDP

Oportun Vulnerability Disclosure Program

Complete guide to Oportun's vulnerability disclosure program on HackerOne. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

Oportun runs a vulnerability disclosure program on HackerOne. The program has 44 in-scope assets and is managed by HackerOne's triage team.

44
In-Scope Assets
15h
Avg Response
100%
Efficiency

In-Scope Assets

AssetTypeMax SeverityEligible
api.digit.coURLCriticalNo Bounty
aplica.oportun.comURLCriticalNo Bounty
apollo.oportun.comURLCriticalNo Bounty
apply.oportun.comURLCriticalNo Bounty
awsqa12.progressfinservices.comURLCriticalNo Bounty
awsqa13.progressfinservices.comURLCriticalNo Bounty
awsqa7.progressfinservices.comURLCriticalNo Bounty
build.jenkins.progressfinservices.comURLCriticalNo Bounty
callback.oportun.comURLCriticalNo Bounty
collections.oportun.comURLCriticalNo Bounty
corp-fileshare.oportun.comURLCriticalNo Bounty
db-prod-redshift-cluster.oportun.comURLCriticalNo Bounty
digit-gateway-prod1.oportun.comURLCriticalNo Bounty
digit.coURLCriticalNo Bounty
docusign-qa12.progressfinservices.comURLCriticalNo Bounty
docusign-qa13.progressfinservices.comURLCriticalNo Bounty
exchange-admin.oportun.comURLCriticalNo Bounty
help.oportun.comURLCriticalNo Bounty
http://account.oportun.com/URLCriticalNo Bounty
https://account.oportun.com/loginURLCriticalNo Bounty
https://account.oportun.com/servicesURLCriticalNo Bounty
https://oportun.comURLHighNo Bounty
investor.oportun.comURLCriticalNo Bounty
kiosk.oportun.comURLCriticalNo Bounty
loan.oportun.comURLCriticalNo Bounty
loans.oportun.comURLCriticalNo Bounty
locations.oportun.comURLCriticalNo Bounty
mariadb-analytics-pa-db-1-a.oportun.comURLCriticalNo Bounty
mariadb-data-db-1-a.oportun.comURLCriticalNo Bounty
mariadb-data-db-2-a.oportun.comURLCriticalNo Bounty
mysql-analytics-db-1-a.oportun.comURLCriticalNo Bounty
offers.oportun.comURLCriticalNo Bounty
office365.oportun.comURLCriticalNo Bounty
online-origination-sec-2615.dev.pfops.comURLCriticalNo Bounty
online-origination.1.app.stageURLCriticalNo Bounty
online-origination.1.app.stage.pfops.comURLCriticalNo Bounty
operations.oportun.comURLCriticalNo Bounty
oportun.comURLCriticalNo Bounty
postgres-prod-analytics-db-1-a.oportun.comURLCriticalNo Bounty
press.oportun.comURLCriticalNo Bounty
redshift-dev-cluster.oportun.comURLCriticalNo Bounty
redshift-prod-cluster.oportun.comURLCriticalNo Bounty
rewardredeem.oportun.comURLCriticalNo Bounty
services.oportun.comURLCriticalNo Bounty

Out-of-Scope Assets

  • admincloud.oportun.com
  • betaesxi.oportun.com
  • blog.oportun.com
  • blogdev.oportun.com
  • blue.oportun.com
  • careers.oportun.com
  • citrix.oportun.com
  • cms2.oportun.com
  • creditcard.oportun.com
  • creditcards.oportun.com
  • dev.oportun.com
  • dev2.oportun.com
  • develop.oportun.com
  • devops.oportun.com
  • devopsprod.oportun.com
  • devpress.oportun.com
  • dl.oportun.com
  • email.oportun.com
  • fileshare.oportun.com
  • firstlook.oportun.com

Tips for Hacking Oportun

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking Oportun?

Sign up on HackerOne, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does Oportun pay bounties?

No, Oportun runs a Vulnerability Disclosure Program (VDP) without monetary rewards. You may receive recognition or swag.

What types of vulnerabilities does Oportun accept?

Oportun accepts reports for vulnerabilities found in their 44 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.