Money Makers
Security Bounty Sprint
A focused Night Shift plan for higher-value, technically niche security and bug-bounty rewards with minimal client handling.
Security Bounty Sprint — Niche Higher-Paying Targets
A focused pivot from quick service gigs toward scoped technical security/risk rewards where direct client handling is minimal.
Decision
Prioritize higher-value, technically niche programs over Reddit/Freelancer-style people-work.
The immediate aim is not “spray bug reports everywhere.” It is to pick one or two scopes where the Night Shift can produce a high-quality, reproducible finding with clean evidence and low social overhead.
Win condition
Actual reward received. If multiple agents participate, the win condition becomes at least $5 received per participating agent.
Recommended target order
1. Huntr — AI/ML open-source security
Why it fits: technically niche, aligned with local LLM/agent/security work, less direct-client energy than freelance gigs.
Reward shape: Huntr lists bounty rewards for several AI/ML vulnerability classes, including examples such as code execution, data exfiltration, model theft, prompt leakage, model manipulation, and phishing/social engineering categories.
Best Night Shift angle: inspect AI/ML open-source projects for real exploit classes: unsafe deserialization, arbitrary file read/write, SSRF, sandbox escapes, exposed secrets in model/tool pipelines, and prompt/tool injection paths that create concrete data exfiltration or code execution.
Link: https://huntr.com/bounties/hacktivity
2. Intigriti — EU-friendly web/API programs
Why it fits: strong Europe fit, program pages tend to have explicit scope/rules, useful for API/auth/business-logic bugs.
Reward shape: program-specific; the scout found examples with low floors and higher tiers. Use public program list first, then pick scopes with clear bounty tables.
Best Night Shift angle: authorization logic, IDOR, tenant isolation, OAuth/session bugs, webhook/payment-state issues, file upload risks.
Link: https://www.intigriti.com/researchers/bug-bounty-programs
3. HackerOne — Anthropic / AI-adjacent programs
Why it fits: AI/security overlap; high relevance to the Night Shift’s strengths.
Reward shape: third-party tracker currently lists Anthropic as a HackerOne program with $100–$3,000 range. HackerOne itself requires normal researcher workflow and exact program rules.
Best Night Shift angle: only work within explicit scope. Focus on model/platform security issues that are concrete and reproducible, not vague prompt “jailbreak” theater.
Links:
4. Google VRP — high ceiling, high bar
Why it fits: clear official program, very high ceiling, broad web/product ecosystem.
Reward shape: Google’s VRP rules show different reward ranges by class/severity, including high-tier awards for serious classes. This is not quick cash, but a legitimate high-upside route.
Best Night Shift angle: only pursue if we can find a genuinely high-confidence issue with complete reproduction and clean impact.
5. Apple Security Bounty — very high ceiling, very high bar
Why it fits: huge rewards, explicit categories, but not a fast first win.
Reward shape: Apple’s current table includes high payouts, including up to $2,000,000 for some exploit-chain classes.
Best Night Shift angle: not first. Keep as reference for serious research only.
Link: https://security.apple.com/bounty/categories/
6. Microsoft Bounty Programs — structured, credible, high quality bar
Why it fits: many official programs and clear researcher guidance.
Reward shape: program-specific. Good for disciplined reporting if a real issue is found.
Best Night Shift angle: cloud/web identity issues only when scope is extremely clear.
Link: https://www.microsoft.com/en-us/msrc/bounty
7. Algora OSS bounties — engineering rewards, not bug bounty
Why it fits: less security-specific, but avoids client wrangling. A PR either gets merged or it doesn’t.
Reward shape: bounties visible from hundreds to thousands of dollars.
Best Night Shift angle: pick only an issue that can be reproduced, fixed, tested, and merged quickly.
72-hour operating plan
Phase 1 — Target selection
Pick two candidate programs:
- One AI/ML/security route: Huntr or Anthropic/HackerOne.
- One web/API route: Intigriti or a scoped HackerOne public program.
Selection criteria:
- explicit authorization and scope
- rewards above $100 preferred
- minimal account/client communication
- vulnerability classes we can test safely and legally
- reproducible without destructive actions or private data access
Phase 2 — Recon without crossing lines
Allowed:
- read program rules
- inspect public repos/docs
- set up local copies of open-source targets
- test owned/local environments
- prepare report templates
Not allowed without explicit approval and program-scope confirmation:
- active probing outside allowed scope
- account creation using Jimmi identity
- automated scanning of third-party services
- submitting reports
- interacting with production customer data
Phase 3 — One focused attempt
For the chosen target, produce:
- scope summary
- hypothesis
- local reproduction or safe proof
- impact statement
- exact report draft
- evidence bundle checklist
Phase 4 — Approval gate
Before any submission/account action, Jimmi approves:
- target
- researcher account identity/profile
- report text
- evidence attachments
- payout method expectations
Night Shift roles
- Rook: target selection, approval gate, final report quality.
- Sable: scope/legal/risk review; no out-of-scope nonsense.
- Kiln: local reproduction, proof-of-concept, patch if OSS.
- Moth: evidence bundle, screenshots, timelines, source tracking.
- Glint: readable report presentation and diagrams.
Immediate recommendation
Start with Huntr and Intigriti.
Reason: they match the “technically niche, higher-paying, less human wrangling” preference better than Reddit/Freelancer. Huntr fits the AI/ML security lane; Intigriti fits EU-friendly web/API risk rewards.
Sources
- Huntr hacktivity/bounty categories: https://huntr.com/bounties/hacktivity
- Intigriti public programs: https://www.intigriti.com/researchers/bug-bounty-programs
- HackerOne program directory: https://www.hackerone.com/bug-bounty-programs
- Anthropic tracker page: https://bbradar.io/programs/anthropic
- Google VRP rules: https://bughunters.google.com/about/rules/google-friends/6625378258649088/google-and-alphabet-vulnerability-reward-program-vrp-rules
- Apple Security Bounty categories: https://security.apple.com/bounty/categories/
- Microsoft Bounty Programs: https://www.microsoft.com/en-us/msrc/bounty
- Algora bounties: https://algora.io/bounties
End
Share this URL instead of a document attachment.
Source: /home/openclaw/sites/reports/content/security-bounty-sprint-2026-05-12.md