Security reports, verified for
engineers

Receive verified security reports from Triage's researcher community. Triage confirms what's real and sends proof to engineers.

Report Digest
https://security.yourdomain.com
Avatar
Johnny Appleseed [email protected]
Submitted February 24, 2026
Closed Positive

Feb 24

Submitted 2026

7.1

High

CWE-639

Weakness

Overview
Report
Updates
Evidence
Actions

Tri's Report

Reproduction Successful
Human Review Not Required
View Reason

Executive Summary

Quality
3/5

An Insecure Direct Object Reference (IDOR) vulnerability has been identified in the portfolio API endpoint of the Super Secure Crypto application at /api/v2/user/portfolio. An authenticated user can access any other user's portfolio holdings, transaction history, and linked wallet addresses by enumerating the account_id parameter in GET requests without proper authorization checks.

Recommended Fix

Implement server-side authorization checks to verify that the authenticated user's session token corresponds to the requested account_id before returning any data. Replace sequential integer IDs with UUIDs and add rate limiting.

View Detailed Fix with Code Examples

Get discovered by top researchers.

Triage Security is where security researchers go to find bug bounty and vulnerability disclosure programs. Add yours today and stand alongside these industry leaders.

Johnny Appleseed

64 min ago (Mar 9, 2026, 11:19 PM)

Report submitted

Triage in minutes, not weeks.

Traditional bug bounty platforms leave reports sitting in a queue for days or weeks, waiting for a human triager to get around to them. With Tri, our AI triage agent, every incoming report is analyzed the moment it arrives. Automatically assessing severity, verifying scope, checking for duplicates, and asking smart follow-up questions automatically. Your team gets actionable, triaged reports instead of a growing backlog.

Faster fixes. Lower costs. Zero backlog.

Evidence backed triage.

Tri spins up an isolated environment, follows the researcher's reproduction steps, and captures a complete evidence pack: screenshots, payloads, HTTP traces, and reproduction notes your developers can act on immediately. Unsupported or flaky cases are labeled clearly and routed to human review, so your team only sees reports worth fixing. When it's time to justify a bounty payout, the evidence is already there, documented and exportable.

Fix faster. Justify payouts. Ship with confidence.

Triage Evidence

1
screenshot

2a1b1b63

A screenshot of the victim's portfolio dashboard accessed via account_id=74822, showing full financial summary, asset balances (3.42 BTC, 18.7 ETH, 12.5 SOL, 1,053 USDT), and transaction activity while logged in as the attacker (ID: 1001).

Download

All Files

7
screenshot
auth-bypass.har
HAR
response_74822.html
HTML
api_accounts.json
JSON
request_replay.http
HTTP
repro_steps.md
MD
triage-export
ZIP
screenshot
auth-bypass.har
HAR
response_74822.html
HTML
api_accounts.json
JSON
request_replay.http
HTTP
repro_steps.md
MD
triage-export
ZIP
Triage Logo
Triage Security
GitHub
Jira
Slack
Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.

Connects with your stack.

Triaged reports flow directly into the tools your team already uses. No copy-pasting, no context switching. When Tri finishes triage, actionable tickets land in Jira or GitHub and notifications hit Slack.

Your workflow. Our automation. Zero friction.

Audit evidence, generated automatically.

Don't worry when auditors ask for Common Criteria 7.1 or ISO 27001 artifacts. Triage generates compliance-ready reports on your behalf with vulnerability summaries, remediation timelines, triage decisions, and evidence packs. All exportable and audit-ready from day one.

Compliance without the busywork.

vulnerability_summary_2026.pdf ISO 27001

Vulnerability Summary Report

1. Executive Summary

During the reporting period, 47 vulnerability reports were received through the bug bounty program. Of these, 31 were validated, 9 were duplicates, and 7 were out of scope.

2. Severity Breakdown

Critical: 3
High: 8
Medium: 14
Low: 6

3. Remediation Status

Mean time to remediation: 4.2 days. All critical findings resolved within SLA. Evidence packs attached for each validated finding per A.12.6.1.

https://security.yourdomain.com

Submit Report

AcmeCorp | https://acmecorp.com
VDP Gold Standard

Describe the vulnerability

What asset(s) are affected? What is the vulnerability? In clear steps, how do you reproduce it?

Summary:

The platform's portfolio API endpoint (/api/v2/user/portfolio) is vulnerable to an Insecure Direct Object Reference (IDOR) via the account_id parameter. An authenticated user can access any other user's portfolio holdings and linked wallet addresses by enumerating the ID value.

Write Preview
Type / to format

Your brand, your program.

Your vulnerability disclosure program should feel like yours. Triage lets you fully customize the researcher facing experience. Upload your logo, set your brand colors, and choose between dark and light mode. Embed the submission form directly on your site with an iframe, point a custom domain like security.yourcompany.com, or let researchers discover you through the Triage public directory. Every surface carries your identity.

One platform, every surface, fully branded.

What makes Triage Security unique.

Built for teams of every size, and the most researcher-friendly platform in the industry.

Spam Reduction

Advanced bot fingerprinting and spam filtering. You only see valid vulnerabilities.

IDOR on /api/users endpoint
CWE-639 (Critical)
Valid
Automated scan output
Bot fingerprint detected
Blocked
Stored XSS in comment field
CWE-79 (High)
Valid
Missing security headers
Duplicate: already triaged
Duplicate
SQL injection via search param
CWE-89 (Critical)
Valid

Invite Only

Start with high-signal researchers, or bring your own community before going public. You control who has access and when.

Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher
Researcher

Built For Everyone

Start without a sales call. Get your first 100 triages for free every year. Pay for verification capacity, not seats. Upgrade only when you need advanced controls.

100FREE / YEAR

Global

We're less restrictive than other platforms so you can access top-tier talent worldwide. We handle compliance and payouts on your behalf.

Launch in 30 minutes.

Start small. Scale verification when you're ready.

01

Connect Domain

Link your domain and configure DNS so your program lives at a URL you control.

02

Define Scope

Specify which assets, endpoints, and vulnerability types are in scope for researchers.

03

Review Program

Preview your program page, adjust reward tiers, and finalize your policies before going live.

04

Launch as Bug Bounty or VDP

Go live with a paid bug bounty or a free vulnerability disclosure program. Switch anytime.

05

Connect your custom domain (Optional)

Get a custom domain like security.yourdomain.com that links to your program page.

How much are you spending on triage?

Compare annual platform costs as submissions scale.

75 16k
75
75 submissions
HackerOne HackerOne
$42,650
Bugcrowd Bugcrowd
$11,988
Triage Security Triage Security
$4,788