Friborg Reports

Money Makers

Security Bounty Sprint

A focused Night Shift plan for higher-value, technically niche security and bug-bounty rewards with minimal client handling.

12 May 2026Appwrite-backedPresentation view
01 / 08

Security Bounty Sprint — Niche Higher-Paying Targets

A focused pivot from quick service gigs toward scoped technical security/risk rewards where direct client handling is minimal.

02 / 08

Decision

Prioritize higher-value, technically niche programs over Reddit/Freelancer-style people-work.

The immediate aim is not “spray bug reports everywhere.” It is to pick one or two scopes where the Night Shift can produce a high-quality, reproducible finding with clean evidence and low social overhead.

03 / 08

Win condition

Actual reward received. If multiple agents participate, the win condition becomes at least $5 received per participating agent.

04 / 08

Recommended target order

1. Huntr — AI/ML open-source security

Why it fits: technically niche, aligned with local LLM/agent/security work, less direct-client energy than freelance gigs.

Reward shape: Huntr lists bounty rewards for several AI/ML vulnerability classes, including examples such as code execution, data exfiltration, model theft, prompt leakage, model manipulation, and phishing/social engineering categories.

Best Night Shift angle: inspect AI/ML open-source projects for real exploit classes: unsafe deserialization, arbitrary file read/write, SSRF, sandbox escapes, exposed secrets in model/tool pipelines, and prompt/tool injection paths that create concrete data exfiltration or code execution.

Link: https://huntr.com/bounties/hacktivity

2. Intigriti — EU-friendly web/API programs

Why it fits: strong Europe fit, program pages tend to have explicit scope/rules, useful for API/auth/business-logic bugs.

Reward shape: program-specific; the scout found examples with low floors and higher tiers. Use public program list first, then pick scopes with clear bounty tables.

Best Night Shift angle: authorization logic, IDOR, tenant isolation, OAuth/session bugs, webhook/payment-state issues, file upload risks.

Link: https://www.intigriti.com/researchers/bug-bounty-programs

3. HackerOne — Anthropic / AI-adjacent programs

Why it fits: AI/security overlap; high relevance to the Night Shift’s strengths.

Reward shape: third-party tracker currently lists Anthropic as a HackerOne program with $100–$3,000 range. HackerOne itself requires normal researcher workflow and exact program rules.

Best Night Shift angle: only work within explicit scope. Focus on model/platform security issues that are concrete and reproducible, not vague prompt “jailbreak” theater.

Links:

4. Google VRP — high ceiling, high bar

Why it fits: clear official program, very high ceiling, broad web/product ecosystem.

Reward shape: Google’s VRP rules show different reward ranges by class/severity, including high-tier awards for serious classes. This is not quick cash, but a legitimate high-upside route.

Best Night Shift angle: only pursue if we can find a genuinely high-confidence issue with complete reproduction and clean impact.

Link: https://bughunters.google.com/about/rules/google-friends/6625378258649088/google-and-alphabet-vulnerability-reward-program-vrp-rules

5. Apple Security Bounty — very high ceiling, very high bar

Why it fits: huge rewards, explicit categories, but not a fast first win.

Reward shape: Apple’s current table includes high payouts, including up to $2,000,000 for some exploit-chain classes.

Best Night Shift angle: not first. Keep as reference for serious research only.

Link: https://security.apple.com/bounty/categories/

6. Microsoft Bounty Programs — structured, credible, high quality bar

Why it fits: many official programs and clear researcher guidance.

Reward shape: program-specific. Good for disciplined reporting if a real issue is found.

Best Night Shift angle: cloud/web identity issues only when scope is extremely clear.

Link: https://www.microsoft.com/en-us/msrc/bounty

7. Algora OSS bounties — engineering rewards, not bug bounty

Why it fits: less security-specific, but avoids client wrangling. A PR either gets merged or it doesn’t.

Reward shape: bounties visible from hundreds to thousands of dollars.

Best Night Shift angle: pick only an issue that can be reproduced, fixed, tested, and merged quickly.

Link: https://algora.io/bounties

05 / 08

72-hour operating plan

Phase 1 — Target selection

Pick two candidate programs:

  1. One AI/ML/security route: Huntr or Anthropic/HackerOne.
  2. One web/API route: Intigriti or a scoped HackerOne public program.

Selection criteria:

  • explicit authorization and scope
  • rewards above $100 preferred
  • minimal account/client communication
  • vulnerability classes we can test safely and legally
  • reproducible without destructive actions or private data access

Phase 2 — Recon without crossing lines

Allowed:

  • read program rules
  • inspect public repos/docs
  • set up local copies of open-source targets
  • test owned/local environments
  • prepare report templates

Not allowed without explicit approval and program-scope confirmation:

  • active probing outside allowed scope
  • account creation using Jimmi identity
  • automated scanning of third-party services
  • submitting reports
  • interacting with production customer data

Phase 3 — One focused attempt

For the chosen target, produce:

  • scope summary
  • hypothesis
  • local reproduction or safe proof
  • impact statement
  • exact report draft
  • evidence bundle checklist

Phase 4 — Approval gate

Before any submission/account action, Jimmi approves:

  • target
  • researcher account identity/profile
  • report text
  • evidence attachments
  • payout method expectations
06 / 08

Night Shift roles

  • Rook: target selection, approval gate, final report quality.
  • Sable: scope/legal/risk review; no out-of-scope nonsense.
  • Kiln: local reproduction, proof-of-concept, patch if OSS.
  • Moth: evidence bundle, screenshots, timelines, source tracking.
  • Glint: readable report presentation and diagrams.
07 / 08

Immediate recommendation

Start with Huntr and Intigriti.

Reason: they match the “technically niche, higher-paying, less human wrangling” preference better than Reddit/Freelancer. Huntr fits the AI/ML security lane; Intigriti fits EU-friendly web/API risk rewards.

08 / 08

End

Share this URL instead of a document attachment.

Source: /home/openclaw/sites/reports/content/security-bounty-sprint-2026-05-12.md