Rate this page:
A bug bounty program is one of the most powerful post-production tools to help detect vulnerabilities in applications and services. The Marketplace Security Bug Bounty program is a collaboration between Atlassian and Marketplace Partners aiming to continuously improve the security posture of Atlassian Marketplace apps by leveraging crowdsourced vulnerability discovery methods available through bug bounty.
If you have one or more publicly listed apps in the Marketplace, you can apply to participate in this program. Participating apps that meet passing criteria will be highlighted on the Marketplace.
The program aims to give Marketplace Partners the tools to facilitate post-production vulnerability discovery in a cost-efficient way. If you are looking to start or extend your security story, the Marketplace Bug Bounty Program is a convenient way to ensure the security of your apps.
While Atlassian provides incentives and guidelines on how to run a successful bug bounty program,
the details of implementation are largely determined by Marketplace Partners. This means that you can control the number
of researchers invited to your program, the bounty payout structure, and the in-scope targets.
Therefore, whether you want to begin security testing on all of your apps, or with one or two and grow your program later, the Marketplace Bug Bounty Program can be tailored to fit your organization’s requirements and use cases.
A bug bounty program helps increase trust between Marketplace Partners and customers. From the program, you can generate third-party penetration test reports for your customers. For reference, please see Atlassian’s published reports on the Security practices page. Bug bounty programs are also a useful addition to compliance and privacy programs.
The Marketplace Bug Bounty Program is hosted on Bugcrowd, a SaaS platform built to crowdsource vulnerability discovery from a global pool of talented security researchers.
The process is as follows:
Bugcrowd invites security researchers to participate in your private program.
When the researchers accept the invite, they're given instructions about what they are and aren’t allowed to test. For example, you may want the researchers to test your flagship Marketplace apps, but not your main website or your newer apps. You also explain how to set up each of the targets, so they can start testing them quickly.
The researchers test your targets for vulnerabilities. If they believe they have detected a vulnerability, they report the finding using the Bugcrowd platform, and include enough detail for others to reproduce the vulnerability.
The Bugcrowd Application Security Engineering (ASE) reviews the report. They ensure the vulnerability is reproducible, is within the scope of your program, and includes any additional information you have requested.
When the ASE team is confident that the vulnerability report is valid, they flag it as triaged, and your team is notified that a potential vulnerability has been discovered.
Your team reviews the report to see if they agree with the security researcher and ASE’s assessment. If they agree that the vulnerability needs fixing, then you reward the security researcher with a bounty (see below for the recommended bounty amounts). This reward thanks the researcher and compensates them for their hard work and dedication in finding the vulnerability.
You create a ticket for your team to fix the vulnerability and improve the security of your application.
When the vulnerability is fixed, you notify the researcher and they are usually happy to test your fix.
And that’s it. Your application is more secure, the researcher moves on to look for more vulnerabilities, and the cycle begins again.
We want to promote security-conscious apps in the Marketplace. Therefore, when you participate in paid bug bounty programs, this information appears on your Marketplace listing.
Note that this security badge is awarded by hosting type. If your app has multiple hosting types (cloud/DC/server), each will be evaluated independently and may result in a different outcome.
To receive the Cloud Security Participant badge, your app must meet of the below requirements.
In order for our automation to properly identify your app, you must ensure that you define your targets according to the following standard format, which is adding the Marketplace listing URL in your target definition:
Your target definition on the Bugcrowd platform should look like this:
Make sure that each app in the target scope of your bounty program is the Marketplace listing URL and includes the hosting solution.
|Requirement||Description||Why is this important?|
|Participation||Eligible apps must participate in the Marketplace Bug Bounty Program. |
Participation means that an app is enrolled in the Marketplace Bug Bounty Program and is explicitly defined as a target in the program scope. Each hosting option of an app is considered a unique target.
When an app is removed from program scope or when a program is paused, it will no longer qualify for the security badge.
|This requirement ensures that you’ve authorized external researchers to test your apps for vulnerabilities, as well as committed to remediate security flaws in your apps.|
|Exposure||Eligible apps must be in scope of the Marketplace Bug Bounty Program for a minimum of 4 weeks and at least 100 security researchers must have been invited to the program. |
Note that time an app that participated in the Marketplace Bug Bounty Blitz counts toward this requirement.
|This requirement ensures that your app has been exposed to security testing long enough for researchers to discover and report potential issues.|
|Incentives||Eligible apps must commit to the following minimum bounty payout structure: |
P1 → $1500
P2 → $900
P3 → $300
P4 → $100
|This requirement ensures that you give researchers proper incentives to participate in your program and focus on target apps.|
|Responsiveness||Eligible apps meet Triage SLAs for all incoming submissions. This means that reports must be accepted or rejected within 2 weeks after they have been triaged by Bugcrowd ASE||This requirement ensures that you review reports in a timely fashion and that there is a consistent feedback loop between you and security researchers.|
|Remediation||Eligible apps meet Remediation SLAs for all P1 (critical) and P2 (high) submissions. This means that critical and high severity vulnerabilities are remediated within Atlassian security SLAs. |
How to request SLA extensions for bug bounty submissions
Whenever you receive a valid report through your bug bounty program, a corresponding ticket will be created in AMS. (To learn more about AMS and our approach to Vulnerability Management, please see this page).
Please transition the ticket status to and provide an explanation for why the extension is needed in the ticket comments along with a remediation timeline. A member of Atlassian Security will review your request and either approve or deny it.
If the extension request is approved, your security badge will be unaffected.
Note that you are still responsible for meeting the new SLA to maintain the badge.
If the request is denied, your app will temporarily lose the badge until the vulnerability is remediated.
|This requirement ensures that you are committed to fixing security vulnerabilities and that your remediation policy aligns with Atlassian standards.|
Atlassian has a long history of running a Bug Bounty Program. Through experience, we were able to narrow down a set of best practices that contribute to a successful program. We highly recommend for Marketplace Partners to consider these practices in addition to the trust signal requirements:
Assign a Bug Bounty program owner from your organization. The program owner is the point of contact for Atlassian should we need to get in touch about the bounty program.
Continuously assess the value the program provides. Ask yourself if you are getting the most value out of your program? If you’re not seeing a lot of submissions, consider adding new apps as targets, inviting more researchers to the program or increasing rewards.
Develop sound legal policy that protects both the company and the good-faith researcher. Policies like Safe Harbor allow organizations and researchers to set clear legal scope around parameters of testing.
In the first week of every month, Atlassian does an automated check to ensure Marketplace Partners and their apps have either maintained their eligibility for the security badge or become newly eligible for the security badge.
The apps are then updated based on the results of the automated check. Note, occasionally the automation is delayed due to internal dependencies and may run a few days later than planned.
If you think your badge has been updated incorrectly, please raise a request here.
As part of the agreement with Bugcrowd, Atlassian covers all of the platform costs for our Marketplace Partners: you do not have to pay for access to the Bugcrowd platform and services.
You, as the Marketplace Partner, need to cover the costs of the bounty payouts. Below is a table of the minimum recommended payout structure for your bug bounty program.
|Vulnerability severity||Bug bounty reward amount (in USD)|
|P5 (No appreciable security impact)||$0|
Please note that you are not locked into the payout range you start out with. Instead, you can increase the payouts over time, as your program matures.
The decision about the severity of a vulnerability and the payout to the researcher is entirely at your discretion. You are not required to pay for duplicate submissions and will generally pay out only for the first report of any valid vulnerability.
If you’re a Marketplace Partner in the Atlassian Marketplace, you can request to join the program by raising a ticket at this service desk. The Ecosystem Security Team will work with you to set up your program.
Please allow a minimum of 3 weeks from the date of your request to program launch.
If you’re a Marketplace Partner and you have been onboarded to Marketplace Bug Bounty Program, you can request to make changes to your program i.e. adding new target apps to program scope, inviting more researchers to your program or any other program support by raising a ticket at this service desk. The Bugcrowd Support Team will work with you to manage your program.
Rate this page: