'Coding has over 700 languages', '67% of programming jobs aren’t in the technology industry', 'Coding is behind almost everything that is powered by electricity', 'Knowing how to code is a major requirement for astronomers', 'The first computer didn’t use any electricity', 'Do you know there is a coding language named “Go“', 'Computer programming is one of the fastest-growing careers', 'Fortran (FORmula TRANslation) was the name of the first programming language', 'The first programmer was the daughter of a mad poet', 'Many programming languages share the same structure', 'Coding will soon be as important as reading', 'How many programmers does it take to change a light bulb? None, that’s a hardware problem', 'Why do Java developers wear glasses? Because they can’t C', 'Software and temples are much the same — first we build them, then we pray', 'An engineer will not call it a bug — it’s an undocumented feature', 'In a room full of top software designers, if two agree on the same thing, that’s a majority', 'C programmers never die. They are just cast into void', 'Knock, knock … Who’s there? … *very long pause* … Java', 'The best thing about a boolean is even if you are wrong, you are only off by a bit', 'Linux is only free if your time has no value', 'The computer was born to solve problems that did not exist before', 'Coding has over 700 languages', '67% of programming jobs aren’t in the technology industry', 'Coding is behind almost everything that is powered by electricity', 'Knowing how to code is a major requirement for astronomers', 'The first computer didn’t use any electricity', 'Do you know there is a coding language named “Go“', 'Computer programming is one of the fastest-growing careers', 'Fortran (FORmula TRANslation) was the name of the first programming language', 'The first programmer was the daughter of a mad poet', 'Many programming languages share the same structure', 'Coding will soon be as important as reading', 'How many programmers does it take to change a light bulb? None, that’s a hardware problem', 'Why do Java developers wear glasses? Because they can’t C', 'Software and temples are much the same — first we build them, then we pray', 'An engineer will not call it a bug — it’s an undocumented feature', 'In a room full of top software designers, if two agree on the same thing, that’s a majority', 'C programmers never die. They are just cast into void', 'Knock, knock … Who’s there? … *very long pause* … Java', 'The best thing about a boolean is even if you are wrong, you are only off by a bit', 'Linux is only free if your time has no value', 'The computer was born to solve problems that did not exist before',

Coding Ninjas Bug Bounty Program

Responsible Disclosure & Bug Bounty

security image
Program Details

At Coding Ninjas we take security very seriously. If you believe that you have found a security vulnerability on Coding Ninjas, we encourage you to let us know straight away. We will investigate all legitimate reports and do our best to quickly fix the problem.

We give out rewards for reported bugs and vulnerabilities but these are discretionary and provided on a case by case basis.



Responsible Disclosure Guideline
  • You will not publicly disclose a bug before it has been fixed.
  • You will protect our users' privacy and data. You will not access or modify data without our permission.
  • You will ensure no disruption to our production systems and no destruction of data during security testing.
  • You do not violate any other applicable laws or regulations. Coding Ninjas will not be responsible for non-adherence of laws from your end.
  • If any privacy violation is inadvertently caused by you while testing, you are liable to disclose it immediately to us.
  • You do not exploit a security issue you discover for any reason other than for testing purposes, and you do not conduct testing outside of your own account, a test account, or another account for which you have the explicit written consent of the account owner to test.
  • You will not attempt phishing or security attacks.
  • Due to a high number of submissions, we may take a reasonable time to fix the vulnerability reported by you. You have to allow us time to respond to you.
  • You must be the first person to report the issue to us. We will review duplicate bugs to see if they provide additional information, but otherwise only reward the first reporter.
  • You will provide necessary assistance to us, if required, in resolving the security issue
  • Please send all reports to: security@codingninjas.com


Rewards

We award rewards in cash, NinjaCoins (Coding Ninjas Credits), goodies. Rewards are evaluated on a case to case basis depending on the severity of the vulnerability. It is entirely at Coding Ninjas discretion to decide whether a bug is significant enough to be eligible for a reward. Bounty rewards are not negotiable.

Certificates and Hall Of Fame are work in progress, and will be announced here when available.



What's in scope?
  • codingninjas.com
  • classroom.codingninjas.com
  • api.codingninjas.com
  • codezen.codingninjas.com
  • mentor.codingninjas.com
  • profile.codingninjas.com
  • Coding Ninjas Android and iOS App versions released in last 6 months


Not in scope
  • Issues related to software/application not under Coding Ninjas control
  • www.codingninjas.com/blog (In scope only in case of critical vulnerability which impacts Coding Ninja's platform users which are different from users/authors on blog.)
  • Spam or social engineering techniques.
  • Denial-of-service attacks.
  • Self-type Cross Site Scripting / Self-XSS
  • CSRF issues on actions with minimal impact
  • Reports indicating a lack of DMARC, DKIm, missing SPF records.
  • Presence of banner, server version information, EXIF information on images.
  • CSRF issues on actions with minimal impact
  • Brute force attacks
  • Standard user enumeration attacks
  • Reports indicating a lack of rate-limiting on certain APIs
  • Click Jacking
  • Lack of security headers, httponly flags, etc
  • Scanner output or scanner-generated reports, including any automated or active exploit tool
  • Any internal or development services.
  • Content injection (also "content spoofing" or "HTML injection") is out of scope unless you can clearly demonstrate a significant risk.


Breach of our program's terms

You are expected to respect all the terms and conditions of Bug Bounty Program. Non-adherence or non-compliance will automatically disqualify you. A serious breach may also lead to suspension of your account.



Changes to Program Terms

Coding Ninjas Bug Bounty Program, and its policies, are subject to change or cancellation at any time, without notice. Also, we may amend the terms and/or policies of the program at any time. In case of any change, a revised version will be posted here.