TMF Group Bug Bounty Program

Program Type: Private Launched: May 27, 2025 Ongoing

TMF Group is committed to ensuring the security and integrity of our services. As part of this commitment, we are launching the TMF Group Bug Bounty Program. Through this program, we encourage security researchers to responsibly disclose any potential vulnerabilities they find on our platforms, thereby contributing to our continuous drive to enhance the safety and security of our systems.

Total Submissions

62

Total Researchers

15801

~

Testing Cycles

423

Submission Rate

0.26%

TMF Group

About
TMF Group is a single global team with over 11,000 colleagues in more than 125 offices across 87 jurisdictions, covering 92% of world GDP and 95% of FDI inflow. We bring common culture and ways of working, investing heavily in our people and platform to provide a high level of quality and security to our clients. We exist to give clients a global solution to what otherwise requires many local providers, each with their individual operational complexity and risk. Our clients include the majority of the Fortune Global 500, FTSE 100 and top 300 private equity firms. We see ourselves as a partner to them, keeping them on top of complex rules and regulations in the countries where they are active. We recognise that what we do is critical to our clients’ reputation and integrity. That is why we have made flawless service our single obsession. Great service starts with our people, so colleague and client engagement are the two measures we care most about, driving our management agenda and investment.
Organization Details
Name
:
TMF Group
Website
: https://www.tmf-group.com/
LinkedIn
: https://www.linkedin.com/company/tmf-group/

Rewards Listing

Shown in INR
Technical Severity Created β‚Ή Reward Range (INR)
P1 Β· Critical 27 May 2025
β‚Ή7000.00  β€“  β‚Ή10000.00
P2 Β· Severe 27 May 2025
β‚Ή5000.00  β€“  β‚Ή7000.00
P3 Β· Moderate 27 May 2025
β‚Ή3000.00  β€“  β‚Ή5000.00
P4 Β· Low 27 May 2025 Certificate of Appreciation
P5 Β· Informational 27 May 2025 Certificate of Appreciation
Rewards are indicative and may vary based on impact, quality, and report clarity.
SLA - Service Level Agreement
Resolution SLAs

Defined resolution targets for reported vulnerabilities

P1 7d
P2 30d
P3 60d
P4 90d
P5 120d
Program Rules
  • Always conduct testing ethically and legally.
  • Do not publicly disclose the vulnerability without obtaining explicit consent from TMF Group.
  • Never attempt to access, modify, delete, or store user data.
  • If using automated tools or scripts, ensure they do not cause harm or excessive traffic to our platforms.
  • Use only your own accounts for testing. Do not interact with or exploit other real users' accounts.
  • If you find multiple vulnerabilities, report them sequentially and not simultaneously, giving us time to respond.
  • Do not conduct tests that may degrade our services or impact our users.


Eligibility to Participate
  • Age: Participants must be 18 years or older at the time of entry.
  • Affiliation: Individuals affiliated with TMF Group, including employees, contractors, and their immediate families, are not eligible to participate.
  • Country of Residence: While we accept submissions globally.
  • Compliance: Researchers must be in full compliance with all terms and conditions of the TMF Group Bounty Initiative.


Out of Scope

Authentication & Session Management

  • Failure to Invalidate Session on Password Reset and/or Change
  • Insufficient session expiration
  • Login or Forgot Password page brute force and account lockout not enforced
  • Logout Cross-Site Request Forgery (logout CSRF)
  • Missing reCAPTCHA/RateLimit
  • Rate limiting or brute-force issues
  • Testing for weak credentials
  • User Enumeration issues

Information Disclosure

  • Disclosure of IP addresses
  • Disclosure of known public files or directories (e.g., robots.txt)
  • Software version disclosure / Banner identification issues / Descriptive error messages or headers
  • Debug information disclosure on the development, UAT, staging etc environment
  • Disclosure of debug information that does not pose a security risk
  • Partial source code disclosure through debug information
  • Public Google API keys used for Maps disclosure
  • Public API keys intentionally exposed for analytics or error reporting purposes (e.g., DataDog client tokens)
  • Leaked credentials from dark web sources
  • Data or credential leaks from sources that do not originate from a vulnerability in our in-scope products

Security Misconfigurations

  • Missing best practices in Content Security Policy
  • Missing HTTP security headers (e.g., Strict-Transport-Security, X-Frame-Options, etc.)
  • Missing HttpOnly or Secure flags on cookies
  • SSL/TLS related issues
  • Using known vulnerable components
  • Vulnerabilities were related to outdated, unpatched browsers or operating systems

Injection & Spoofing

  • Comma Separated Values (CSV) injection
  • Content spoofing and text injection issue
  • Self XSS

Access Control & Redirection

  • Open redirect - unless an additional security impact can be demonstrated
  • Subdomain-takeovers
  • Tabnabbing

Testing & Exploit Limitations

  • Theoretical issues that are not exploitable, or cannot be demonstrated as exploitable
  • Potential post-exploitation scenarios (must be reported immediately)
  • Issues that require unlikely user interaction

Email & Communication Protocols

  • Attacks related to email servers, email protocols, and email security (e.g., SPF, DMARC, DKIM, or email spam)
  • Email bombing/Flooding/rate limiting

Third-Party & External Services

  • Third-party services that are not owned by TMF-Group
  • TMF-Group Related Public Repos on various platforms

Denial of Service & Disruption

  • Any activity that could lead to the disruption of our service (DoS), including stress-testing or load-testing tools

Social Engineering

  • Social engineering (e.g. phishing, vishing, smishing) is prohibited

Broken Links & Hijacking

  • Broken link hijacking issues
  • Broken Link Submissions (Includes Hijacking of broken links)

UI-Based Vulnerabilities

  • Clickjacking/UI redressing/TapJacking
  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
Follow the Rules and Scope

Carefully review and understand the rules and scope of the bug bounty program. Each program has specific guidelines, eligibility criteria, and a defined scope of systems, applications, or services that are in-scope for testing. Focus your efforts on these areas to ensure your findings are eligible for rewards.


Provide Detailed Reports

When reporting a vulnerability, commit to providing clear and comprehensive details to help the organization reproduce and validate your findings. Include step-by-step instructions, proof-of-concept code if applicable, and any other relevant information that can assist the organization's security team in understanding and verifying the issue.


Collaborate Professionally

Engage in professional communication with the organization's security team. Be responsive to any requests for clarification, additional information, or coordination during the vulnerability verification process. Maintain open and respectful communication throughout the entire process, understanding that both parties are working together to improve security.


Responsible Disclosure

Always adhere to responsible disclosure practices. When you discover a vulnerability, avoid exploiting it for malicious purposes or sharing it with unauthorized parties. Instead, immediately report the vulnerability to the program organizers following the reporting process outlined in the program guidelines. This allows the organization to address the issue before potential harm can occur.


Safe Harbor

Researchers participating in our programs are expected to adhere to specific Safe Harbor provisions. They are assured Legal Protection; by complying with all program terms, they're granted a legal safe harbor, ensuring they won't face lawsuits or legal actions for their reported findings. Participants also commit to Responsible Disclosure, providing ample time to address and rectify vulnerabilities and doesn't disclose any findings publically what so ever. Testing should be confined only to systems they have explicit authorization to assess. Furthermore, during the assessment, data access should be minimized, focusing only on what's necessary to validate a vulnerability, and retaining no user data beyond what is absolutely required.