Program Removed

This program is no longer available on YesWeHack. The scope data shown below is historical and may not reflect the final state of the program.

spacelift-io-bug-bounty-program

YesWeHackView on YesWeHack
RawAI Enhanced
6
In Scope
8
Out of Scope
In-Scope Assets (6)
AssetCategoryBountyQuick Links
app.spacelift.devWILDCARDYes
https://spacelift.dev/URLYes
mfaOTHERYes-
native k8s workers and operatorOTHERYes-
oidc-based api keysOTHERYes-
spacelift intentOTHERYes-
Out-of-Scope Assets (8)
AssetCategoryBounty
any communication with spacelift colleaguesOTHERYes
any other spacelift assets not specifically listed as in-scopeOTHERYes
attacks against any account other than the specified target accountsOTHERYes
bypasses of user or api key creation limits (including via race conditions or business logic issues)OTHERYes
contact form (especially hubspot ones)OTHERYes
data breaches or credential dumpsOTHERYes
session keeps using old user group permissions if user group permissions are changed during a given session's lifespanOTHERYes
third-party companies that perform business transactions for spaceliftOTHERYes
Scope Changes (51)
Mar 19, 2026
ChangeAssetCategoryScopeTime
Program Removed23:39
Feb 25, 2026
ChangeAssetCategoryScopeTime
Addedany other spacelift assets not specifically listed as in-scopeOTHEROut of Scope19:08
Addedcontact form (especially hubspot ones)OTHEROut of Scope19:08
Addednative k8s workers and operatorOTHERIn Scope19:08
Addedspacelift intentOTHERIn Scope19:08
Added*.app.spacelift.devWILDCARDIn Scope19:08
Addedthird-party companies that perform business transactions for spaceliftOTHEROut of Scope19:08
Addeddata breaches or credential dumpsOTHEROut of Scope19:08
Addedany communication with spacelift colleaguesOTHEROut of Scope19:08
Addedbypasses of user or api key creation limits (including via race conditions or business logic issues)OTHEROut of Scope19:08
Addedsession keeps using old user group permissions if user group permissions are changed during a given session's lifespanOTHEROut of Scope19:08
AddedmfaOTHERIn Scope19:08
Addedoidc-based api keysOTHERIn Scope19:08
Addedattacks against any account other than the specified target accountsOTHEROut of Scope19:08
Addedhttps://spacelift.dev/URLIn Scope19:08
Feb 22, 2026
ChangeAssetCategoryScopeTime
Addedsession keeps using old user group permissions if user group permissions are changed during a given session's lifespanOTHEROut of Scope00:51
Addedany communication with spacelift colleaguesOTHEROut of Scope00:51
Addedattacks against any account other than the specified target accountsOTHEROut of Scope00:51
Addedspacelift intentOTHERIn Scope00:51
Addednative k8s workers and operatorOTHERIn Scope00:51
Addedoidc-based api keysOTHERIn Scope00:51
Addedany other spacelift assets not specifically listed as in-scopeOTHEROut of Scope00:51
Addeddata breaches or credential dumpsOTHEROut of Scope00:51
Addedthird-party companies that perform business transactions for spaceliftOTHEROut of Scope00:51
Addedhttps://spacelift.dev/URLIn Scope00:51
Added*.app.spacelift.devWILDCARDIn Scope00:51
AddedmfaOTHERIn Scope00:51
Addedbypasses of user or api key creation limits (including via race conditions or business logic issues)OTHEROut of Scope00:51
Addedcontact form (especially hubspot ones)OTHEROut of Scope00:51
Feb 21, 2026
ChangeAssetCategoryScopeTime
Removedthird-party companies that perform business transactions for spaceliftOTHEROut of Scope21:40
Removeddata breaches or credential dumpsOTHEROut of Scope21:40
Removedattacks against any account other than the specified target accountsOTHEROut of Scope21:40
Removedany communication with spacelift colleaguesOTHEROut of Scope21:40
Removedany other spacelift assets not specifically listed as in-scopeOTHEROut of Scope21:40
Removedcontact form (especially hubspot ones)OTHEROut of Scope21:40
Removedbypasses of user or api key creation limits (including via race conditions or business logic issues)OTHEROut of Scope21:40
Removedsession keeps using old user group permissions if user group permissions are changed during a given session's lifespanOTHEROut of Scope21:40
RemovedmfaOTHERIn Scope21:40
Removedoidc-based api keysOTHERIn Scope21:40
Removednative k8s workers and operatorOTHERIn Scope21:40
Removedspacelift intentOTHERIn Scope21:40
Removed*.app.spacelift.devURLIn Scope21:40
Removedhttps://spacelift.dev/URLIn Scope21:40
Addedsession keeps using old user group permissions if user group permissions are changed during a given session's lifespanOTHEROut of Scope00:33
Addedbypasses of user or api key creation limits (including via race conditions or business logic issues)OTHEROut of Scope00:33
Addedcontact form (especially hubspot ones)OTHEROut of Scope00:33
Addedany other spacelift assets not specifically listed as in-scopeOTHEROut of Scope00:33
Addedany communication with spacelift colleaguesOTHEROut of Scope00:33
Addedattacks against any account other than the specified target accountsOTHEROut of Scope00:33
Addeddata breaches or credential dumpsOTHEROut of Scope00:33
Addedthird-party companies that perform business transactions for spaceliftOTHEROut of Scope00:33