Fireflies bug bounty program

Identify security loopholes for a potential bounty reward

What is the bug bounty program?

Fireflies Bug Bounty Program acknowledges the contributions of security researchers who invest time in identifying impactful issues to make our software better and more secure.

Under this program, you need to submit the bug through HackerOne only. By doing that, we ensure that all bugs submitted are completely acknowledged, verified, fixed, and subsequently rewarded.

Submission process

  • check markIdentify a potential/existing vulnerability and send an email to* Include your HackerOne profile id or any email you wish to be invited on.
  • check markFireflies reviews the email and invites you to submit the bug report through our HackerOne bug bounty platform.
  • check markSubmit your results only after ensuring that the bug is reproducible.
  • check markIf approved, we reward you with a bounty based on the bug severity.

* Only use the HackerOne platform for submitting bug reports. Do not submit the report by email.

Use in your meetings to easily take notes and share the transcripts with your teammates afterwards.
shadow image

Things to include in the bug report

Increase your chances of receiving the bounty by submitting a solid report that is clear, concise and includes:

  • check markInformation on the actual/potential impact of the vulnerability.
  • check markHow the vulnerability can be exploited.
  • check markThe methodology used for finding the bug.
  • check markStep-by-step instructions on reproducing the vulnerability.

Feel free to submit the report in your native language if you’re uncomfortable using English.

 Automate your workflow by integrating apps and CRMs with Fireflies, and easily get your files transcribed using in-app upload, zapier or api.
shadow image

Login into your HackerOne account

To learn more about the scope and terms and conditions.