Bugcrowd · Bug Bounty

T-Mobile Bug Bounty Program

Complete guide to T-Mobile's bug bounty program on Bugcrowd. View in-scope assets, reward amounts, response times, and tips for finding vulnerabilities.

Program Overview

T-Mobile runs a bug bounty program on Bugcrowd with a maximum payout of $133,700. The program has 85 in-scope assets and is managed by Bugcrowd's triage team.

85
In-Scope Assets
$133,700
Max Payout

In-Scope Assets

AssetTypeMax SeverityEligible
Self Register Account on T-Mobile Microsoft Entra IDOTHER
Cellular Network Auth Bypass via Web/Mobile AppNETWORK
T&P ServersNETWORK
Full Corporate Network Access or Access to Sensitive Network SegmentsNETWORK
https://apps.apple.com/us/app/t-life-t-mobile-tuesdays/id1111876388IOS
https://play.google.com/store/apps/details?id=com.tmobile.tuesdays&hl=en_US&gl=USANDROID
https://account.t-mobile.comWEBSITE
https://metrobyt-mobile.comWEBSITE
https://sprint.comWEBSITE
https://t-mobile.comWEBSITE
https://api.t-mobile.comAPI
https://tfb.t-mobile.comWEBSITE
https://devedge.t-mobile.comWEBSITE
https://tess.service-now.comWEBSITE
https://digits.t-mobile.comWEBSITE
https://metrobyt-mobile.comWEBSITE
https://t-mobile.comWEBSITE
https://sprint.comWEBSITE
https://api.vistarmedia.comWEBSITE
https://packages.cortexpowered.comWEBSITE
https://api.vistarmedia.euWEBSITE
https://production-dynam-creative.vistarmedia.comWEBSITE
https://storybook.vistarmedia.comWEBSITE
https://creatives.vistarmedia.comWEBSITE
https://sflower.cortexpowered.comWEBSITE
https://production-delivery-metrics-svc.vistarmedia.comWEBSITE
https://maps.vistarmedia.comWEBSITE
https://transcodes-cdn.vistarmedia.comWEBSITE
https://assets-cdn.vistarmedia.comWEBSITE
https://docker-staging.adstruc.comWEBSITE
https://staging-trafficking.vistarmedia.comWEBSITE
https://job-svc-b.vistarmedia.comWEBSITE
https://docsite.vistarmedia.comWEBSITE
https://sfleet.cortexpowered.comWEBSITE
https://audience-builder.vistarmedia.comWEBSITE
https://staging-login.vistarmedia.comWEBSITE
https://clients.adstruc.comWEBSITE
https://demo.adstruc.comWEBSITE
https://*.uscc.netWEBSITE
https://*.uscc.comWEBSITE
https://*.uscellular.comWEBSITE
https://dashboard-101.moengage.comWEBSITE
https://www.assurancewireless.comWEBSITE
https://*.assurancewireless.comWEBSITE
https://assets.platform.blis.comWEBSITE
https://assets.development.amazon-tacticalplanner.comWEBSITE
https://assets.platform.development.blis.comWEBSITE
https://assets.platform.rc.blis.comWEBSITE
https://audiencelogos.blis.comWEBSITE
https://blis.comWEBSITE

Showing 50 of 85 in-scope assets. View all on Bugcrowd.

Out-of-Scope Assets

  • *.sprint.net
  • /self-service-*
  • *.mobile.uscc.net
  • *.mobile.uscc.com
  • https://*.moengage.com
  • Any domain, property, product, protocol, or service of the app/hardware/software version not explicitly listed in the In-Scope section is out of scope; submissions are welcome but not guaranteed for the bounty/bonus.

Tips for Hacking T-Mobile

  1. Read the policy — Understand what's in scope, out of scope, and any specific testing restrictions before you start.
  2. Enumerate the attack surface — Use subdomain enumeration and directory bruteforcing to map all accessible endpoints.
  3. Focus on high-impact bugs — Look for SQL injection, SSRF, and IDOR vulnerabilities first.
  4. Test authentication flows — Check for OAuth misconfigurations and CSRF in login/signup flows.
  5. Write clear reports — Include steps to reproduce, impact assessment, and suggested remediation. Use Burp Suite to capture evidence.

Frequently Asked Questions

How do I start hacking T-Mobile?

Sign up on Bugcrowd, read the program policy carefully, review the in-scope assets listed above, and start testing. Always stay within scope and follow responsible disclosure guidelines.

Does T-Mobile pay bounties?

Yes, T-Mobile offers monetary rewards for valid security vulnerabilities.

What types of vulnerabilities does T-Mobile accept?

T-Mobile accepts reports for vulnerabilities found in their 85 in-scope assets. Common accepted vulnerability types include XSS, SQL injection, SSRF, IDOR, authentication bypass, and RCE. Check the program policy for specific exclusions.