8th-annual-hacker-powered-security-report-2024-2025pdf
8th-annual-hacker-powered-security-report-2024-2025pdf
Hacker-Powered
Security Report
Content
Table of Contents
Executive Summary 1
Conclusion 63
Executive Summary
Cyberthreats are
always evolving.
So must your defenses.
Faster, smarter, and
always ahead.
Every organization is a technology organization. Car manufacturers, government
agencies, and banks do very different things, but they all conduct business digitally.
With AI deployments—as well as AI-powered threat actors—now mainstream, the
digital threat landscape is growing and changing faster than ever.
Just a few years ago, organizations only had to worry about one OWASP Top 10 list.
Now there are OWASP Top 10 lists for mobile security, LLMs and more. What's next?
And how do you stay ahead of it all?
We've been watching these trends and reporting on them for over eight years now in
the Hacker-Powered Security Report. Read on to learn about the impact of AI on
security research, what the researchers themselves are thinking and seeing, industry
trends, and more. We report on the top vulnerability types, and how the most resilient
companies have adopted a defense-in-depth strategy, fortifying every layer of their
security posture and using continuous vulnerability testing throughout the software
development life cycle.
Over the past decade, we’ve seen significant progress for trust
in good-faith research, including updated safe harbor guidelines
from the Department of Justice, legislation requiring
organizations to implement vulnerability reporting processes,1, 2
and increasing adoption of vulnerability disclosure and bug
bounty programs by leading enterprises. In fact, these programs
are now cited in S1 filings as evidence of an organization's
commitment to security.
The security researcher community is maturing its skill sets to meet the
demands of customers, with more members focusing on mobile, APIs, and AI
deployments as testing scope expands to more varied attack surfaces. Nearly
10% of researchers now specialize in AI to meet the growing demand of AI
testing engagements.
64% of respondents believe GenAI will have a major impact on their organization,
with 62% confident in their ability to secure its use. Additionally, 70% believe that
AI legislation will help enhance safety and security. However, 51% are concerned
about the reputational risks tied to AI, and another 51% highlight that basic security
practices are being overlooked in the rush to implement GenAI.
“It’s been previously observed in research from red teaming exercises of AI models
that some individuals are significantly more effective at breaking the models’ defenses
than others. I was surprised that many of the researchers did not know much about AI
but were able to use creativity and persistence to get around our safety filters.”
Ilana Arbisser
Technical Lead, AI Safety, Snap Inc.
LLM06:
Sensitive
Information
Disclosuure
Concerns about AI safety are driving more organizations to seek third-party testing.
Of all AI vulnerability reports submitted, 55% are related to AI safety issues. AI safety
issues often have a lower barrier to entry for valid reporting and present a different
risk profile compared to traditional security vulnerabilities. The reduced barriers to
entry for AI safety reports means bounties for these reports are slightly lower, with an
average payout of $401, versus $689 for AI security programs. While AI safety
vulnerabilities are currently in scope for a limited number of programs, the volume of
reports is notably higher, making AI safety one of the top five reported vulnerabilities.
AI Safety AI Security
Recommendations
Establish continuous testing, evaluation, verification, and validation throughout the AI model life cycle.
Provide regular executive metrics and updates on AI model functionality, security, reliability, and
robustness. Regularly scan and update the underlying infrastructure and software for vulnerabilities.
Train all users on ethics, responsibility, legal issues, AI security risks, and best practices such as warranty,
license, and copyright. Establish a culture of open and transparent communication on the organization’s
use of predictive or generative AI.
For a more detailed checklist for both safety and security testing engagements,
download The Ultimate Guide to Managing Ethical and Security Risks in AI.
overall impact. Companies without AI and automation face longer response times and
higher breach costs.
In a survey of over 2,000 security researchers on the HackerOne Platform, 20% now
see AI as an essential part of their work, up from 14% in 2023. However, only 38%
reported using AI in any capacity, down from 53% last year, suggesting that
researchers who find real value in AI are investing more deeply, while others may have
pulled back after finding less success with initial experiments.
“When pentesting, I use AI to automate repetitive and time-consuming tasks so I can concentrate
on finding security issues. I also use AI to summarize documentation when I want a general
overview of a new technology. When I do content discovery before my pentest, AI allows me to
generate customized wordlists to find niche content that can fly under the radar of commonly
used wordlists."
Accelerate Vulnerability
Remediation with Hai
Use Hai’s tailored advice to quickly interpret complex vulnerability reports with concise summaries and deeper
insights for faster decision-making in the context of your unique technology stack and business needs.
Use Hai to optimize vulnerability reports by having it suggest accurate titles, CVSS scores, and vulnerability
classifications. Hai can also help you craft clear and succinct messages for effective communication between
security, development teams, and researchers.
Automate tasks by integrating Hai to assist with writing assistance, generating custom vulnerability scanner
templates, and managing large reports, reducing manual effort.
Cybersecurity Consultant,
Enterprise, Financial Services
When HackerOne first launched, most hacking activity focused on web applications,
and while 88% of researchers still specialize in this area, the landscape is shifting.
Organizations are now calling on the community to test a wider range of products
and technologies. 56% of researchers also specialize in APIs, while almost 10% now
focus on AI and large language models (LLMs). Although the number of AI-focused
researchers has grown by just 2% since last year, it's promising that nearly 10% are
already working to secure this emerging technology. As more organizations include
AI models in their scope, we expect this number to keep growing.
Data indicates many researchers feel less confident in writing detailed reports,
but GenAI tools are bridging this gap, enabling clearer communication of
findings and higher-quality reports.
The more you and your organization know and understand about researchers
and their skills, motivation, and approaches, the stronger the relationship will
be and the more impactful your program will be.
“With scanning tools, false positives are through the roof. A human researcher,
however, can provide more information and context about a vulnerability, often
leading to Goldman fixing the problem quickly. We don’t want problems to sit around.”
Matt Levine
Global Head of Technology Risk Advisory, Goldman Sachs
Recommendations
Clearly communicate expected response times for report acknowledgment, triage, and resolution.
This builds trust and helps researchers understand when they can expect feedback.
Offer constructive feedback on the report, explaining the vulnerability’s impact and any necessary
remediation steps.
Respond to researchers with respect and professionalism, even if the report is invalid or a duplicate.
Positive interactions encourage ongoing collaboration.
Recommendations
Focus researchers’ efforts on the most critical components of your attack surface. These could
be assets that have stagnant testing, have lacked attention, are new feature investments, or are
recent acquisitions.
Offer more advanced testing opportunities with unique scope or access to gated assets.
Provide researchers with additional documentation to clarify scope, free test accounts, or even
company swag to maximize impact without solely relying on increased bounties.
HackerOne's annual Hacker Advisory Board meetings bring together some of the most
experienced and active security researchers to understand how they evaluate the ROI
of joining specific bug bounty programs. Key factors they consider include:
Brand impact and target organization profile (e.g., a Fortune 500 financial services
company under media scrutiny may offer higher payouts than a local bank)
Our analysis this year centered on top-performing security programs, both private
and public, identified as those with more than 30% of valid vulnerability submissions
rated high or critical. The data reveals that fostering a smaller, highly engaged group
of researchers and offering competitive rewards across a wider testing scope result in
a significantly higher proportion of high and critical findings.
Broader testing scope: Providing more assets for testing, averaging 60 assets
compared to 34 in lower-impact programs.
Collaborate with a select group of skilled researchers who align well to your program’s scope.
Establish reward structures aligned with the criticality of the assets being tested, ideally offering
compensation above market standards.
Ensure your testing scope is broad and varied, allowing researchers with diverse skill sets to
contribute meaningfully. This targeted approach fosters deeper engagement and drives more
impactful security outcomes.
Read more about how HackerOne customers get the best results from researchers.
“I believe in a blanket approach when it comes to which assets to test with bug
bounty. Test everything across the board. People say, ‘We don’t want to put
everything out there,’ but, if one asset is compromised, then the next is too.
If it’s external facing, it should be tested.”
Jose Ramos
Leader in Offensive Security and Penetration Testing, Uber
Kathryn Torelli
Bug Bounty Lead, Capital One
Ambassador
World Cup
The Ambassador World Cup (AWC) is an annual event that brings international
researcher teams together for a friendly competition, with the goal of delivering the
most impactful results for participating customers. While more accessible than a Live
Hacking Event, the Ambassador World Cup still provides customers with dedicated
attention from highly motivated and skilled researchers. Beyond the contributions of
the competing teams, the event's visibility encourages wider community engagement,
as researchers are drawn to test on high-profile customer programs after seeing the
activity through their networks and social media. In the 2023 Ambassador World Cup,
researchers reported over 800 valid vulnerabilities for the 11 participating customers,
demonstrating the event's ability to drive meaningful security outcomes.
Daniel Ventura
Product Security Manager, Adobe PSIRT & Bug Bounty, Adobe
Average bounty payouts have remained Bounties are typically more competitive
steady over the past 12 months, with a in the critical vulnerability category,
5% increase year over year, from $1,066 with the most technology-reliant
to $1,116. However, that’s a decrease of organizations seeing an increase of
10% from 2021, when the average between 20% (internet and online
bounty was $1,246. Organizations need services) and 450% (crypto and
to be wise to the fact that without blockchain) since 2023.
competitive compensation, talented
researchers may move to more lucrative Low-severity bounties, however, have
programs, or focus only on low-hanging not changed significantly year over
fruit that doesn’t require detailed research year. This could be as a result of an
effort, resulting in less exploitable, less increase in automated tools that
critical vulnerabilities. Dynamic, fair surface low-level vulnerabilities before
compensation is key to keeping researchers can find them, reducing
researchers engaged and improving the competition.
organizational security.
The following table shows the median, average, and 95th percentile bounty
payouts across various industry sectors. As in previous years, crypto and
blockchain organizations continue to pay well above the average for
vulnerabilities. The high financial risk, technical complexity, and reputational
stakes in this space drive these organizations to offer significantly higher
bounties to attract top-tier security researchers. We also see more differences
between the industries when we look at the 95th percentile, with traditionally
security-mature industries like internet and online services and retail and e-
commerce paying toward the top end of the average across all levels of severity.
Make a strong business case for your budget that speaks to the priorities of your stakeholders
and board members. Check out the Measuring Success section of this report to see how the
most security-resilient organizations are making the financial case for their bounty budgets
using a return on mitigation (ROM) approach.
Take a tiered-award approach, with bounty awards weighted by asset type. Bounty award
amounts can be adjusted to incentivize testing on your most critical assets as well as assets that
may require a more unique skill set.
Set bounties high enough to attract interest. If you're falling behind your budget and not
receiving reports on business-critical assets, it's a clear sign that your bounties may need
adjustment.
Valid vulnerabilities on the HackerOne Platform have jumped 12% over the past year,
with 78,042 valid issues found across 1,300+ customer programs. Impressively, 27%
of these are rated high or critical. While organizations are making efforts to reduce
vulnerability reports by identifying trends and putting measures in place to catch them
earlier in development, we do expect vulnerability reports to keep rising as more
organizations embrace human-led security.
High and critical reports might be a smaller portion of overall findings, but
they account for most of the bounty spend, especially as severe reports
increase. This trend is even more pronounced in the crypto and
blockchain sectors, where top bounties can hit up to $1 million in the
95th percentile.
Over the past year there was a sharp 180% jump in breaches exploiting
vulnerabilities, according to Verizon’s Data Breach Investigations Report. 4
Incidents like MOVEit and other zero days fueled this surge, mainly
driven by ransomware and extortion-focused attackers, with web
applications being the primary entry point.
Reports for the three most common vulnerabilities are all down by a small
percentage platform-wide since 2023, with reports for cross-site
scripting down 10%, suggesting that some of the tactics to reduce
common vulnerabilities are having an impact. When we look at where
specific industries are seeing the most reports, however, we see a
different trend, with significant increases in reports for the vulnerability
types most common in their systems.
Financial services is one of the most targeted and regulated sectors, having
experienced 70 compromises in Q1 2023, impacting about 1.7 million victims.6 Due to
strict regulations like GDPR and PCI-DSS, they tend to receive more vulnerability
reports, as these standards incentivize researchers to flag potential issues.
“Having hacked on a variety of financial service targets, I've noticed that these organizations often
have a wider and more complex attack surface due to their company structures, which often include
numerous acquisitions and subsidiaries. As a result, I’ve found vulnerabilities on obscure hosts—
sometimes on newly launched or less commonly known domains. Due to the need to obtain an
account for deeper testing, which is difficult and sometimes even impossible due to geographical
restrictions (applying for a loan/credit card), a significant portion of the attack surface remains
untouched."
Recommendations
Implement a strong authorization framework that relies on user policies and hierarchy, and
validate authorization for every request that involves accessing sensitive objects or resources.
Avoid using functions that automatically bind a client's input into variables, internal objects, or
object properties.
Use indirect, random, and unique identifiers instead of exposing direct references to internal
objects and resources. Map these identifiers to the actual objects on the server side while
validating and authorizing user-supplied input.
Government agencies see a much higher rate of XSS vulnerability reports than the
industry average. This is likely due to their many complex web environments, as they
manage a wide range of websites and services for various public functions. This
diversity can lead to inconsistent security practices, making some sites more
vulnerable. Plus, many government systems run on older, legacy technologies that
lack modern security tools. The slower pace of updates in government IT further
increases their exposure to vulnerabilities, putting them at greater risk compared to
more agile industries.
Treat all input as malicious and create a list of what is expected or valid input.
Encode output that, depending on the output context, might require applying combinations
of HTML, URL, JavaScript, and CSS encoding.
Implement a content security policy (CSP) to restrict the sources of executable scripts and
limit the potential impact of XSS attacks.
Implement robust and secure authentication methods, such as strong password requirements,
multi-factor authentication (MFA), secure password storage, and account lockout mechanisms.
Manage session and authentication tokens by generating random, unique, and unpredictable
tokens, securely storing them on the server side, implementing proper session expiration and
logout mechanisms, and avoiding persistent tokens unless necessary.
Avoid exposing unnecessary data in APIs, error messages, or logs, and use generic error
messages to prevent attackers from gaining insights.
Retail and e-commerce are prime targets for cybercrime, with 16 breaches in Q1 2023
affecting 170,000 victims in total. This sector sees the most vulnerability reports for
7
information disclosure due to handling vast amounts of sensitive customer data. The
complexity of e-commerce platforms, featuring dynamic websites and applications,
increases the risk of information leaks through improperly secured APIs, mishandled
user inputs, and flawed data-management practices.
Avoid exposing unnecessary data in APIs, error messages, or logs, and use generic error
messages to prevent attackers from gaining insights.
Follow the principle of least privilege. Grant users and processes the minimum permissions
necessary to perform their tasks.
“The most common issues I encounter in a [retail] chain’s bug bounty program
are due to the many entry points—APIs, user inputs, etc. The organization is
constantly developing and shipping promotions and new systems, which makes
it challenging for them to secure all the integrations and user data. The huge
number of endpoints and systems do make this program a bit tricky, but it’s also
rewarding; new features are continuously appearing, and the security team is
highly communicative and always excellent to work with as a researcher.”
“The vulnerabilities I see the most in retail and e-commerce programs are improper access control,
information disclosure (PII), and account takeover. These kinds of vulnerabilities mostly depend on
manual testing and the hacker’s understanding of the application, and are unlikely to be discovered by
using automated scanning tools. The challenge is that these organizations do not always pay bounties
that are proportionate to the seriousness of the vulnerabilities, which causes hackers to move on from
the program, leaving the organization exposed.”
Validate and sanitize all user input to identify and remove potentially malicious data before
processing any SQL query.
Employ web application firewalls (WAFs) to detect and block SQL injection attempts, conduct
regular security audits and penetration tests, and educate developers on secure coding
practices.
Maurice Stebila
CISO, General Motors
Regularly perform security audits and reviews of system configurations and network
architecture to identify and remediate any misconfigurations, unnecessary services, and open
ports that could lead to security breaches.
Implement a “least privilege” policy to restrict users, accounts, and computing processes' access
to only the resources necessary for their legitimate functions.
Recommendations
Implement the “least privilege” policy and role-based access control (RBAC) to restrict user
permissions, ensuring access is limited to necessary resources based on specific roles.
Implement security tools such as privileged access management (PAM) for granting access, and
intrusion detection/intrusion prevention systems (IDS/IPS) for monitoring and alerting of any
privilege misuse or anomalies.
Keep your applications and systems up to date and perform regular security audits and prompt
patching of software and dependencies to help address potential vulnerabilities.
6
8 SANS 2023 Attack and Threat Report.
Use multi-factor authentication (MFA) for secure access. Re-authenticate users when executing
sensitive functions.
Ensure proper session management is implemented by using secure cookies, expiring sessions
appropriately, and avoiding persistent tokens unless necessary.
Implement input validation and sanitization for all user inputs and avoid using user-controllable
data in URLs.
Provide clear warning for all redirects, notify users they are leaving the site, display the
destination, and require a confirmation click.
Sanitize input by creating a list of trusted URLs (lists of hosts or a regex). Implement the use of
an allow list rather than a deny list.
For example, even though open redirects rank among the top ten reported issues on
the HackerOne Platform, they account for only a small slice of bounty budgets.
Recommendations
Identify the critical systems, applications, and data that will be in scope for the program,
prioritizing high-value assets.
As your program evolves, monitor report volume, payout levels, and researcher feedback to
adjust budgets over time.
Prepare for unexpected high-severity vulnerabilities by having a buffer in the budget for critical
vulnerabilities that may require higher-than-anticipated payouts, ensuring that you can address
major security threats without financial constraints.
Alex Hagenah
Head of Cyber Controls, SIX Group
The integration of findings from both bug bounties and pentests into the
software development life cycle (SDLC) highlights the need for continuous
vulnerability assessment.
Notably, 42% of organizations report discovering the most critical bugs during
the deployment phase when pentests often reveal systemic issues. Together,
pentesting and bug bounties provide comprehensive security coverage,
reinforcing resilience across all development stages.
Recommendations
Define clear scopes for your PTaaS and bounty program so they complement each other rather
than overlap. Use PTaaS for scheduled, structured assessments of high-priority systems and
bug bounty for continuous, exploratory testing across a broader range of assets.
Centralize reporting and communication to track vulnerabilities from both programs and avoid
duplicate efforts by ensuring both sets of testers can see past reports and updates, making it
easier and more transparent for your internal teams, as well.
Rotate pentesters to bring fresh eyes and perspectives to each assessment. Keep bug bounty
always on to ensure 24x7, continuous testing by diverse security researchers.
In contrast, even top-tier bounty payouts in the 95th percentile are relatively small
investments. However, many organizations still struggle to measure the ROI of proactive
security measures like bug bounty programs. Securing budget for these initiatives often
requires stakeholder buy-in, which means translating bug bounty success into clear
financial value.
9
IBM. Cost of a Data Breach Report 2024.
Eric Kieling
Head of Application Security, Booking.com
Introducing Return
on Mitigation
HackerOne recently introduced the concept of return on
mitigation (ROM), an extension of ROI that is specific to
cybersecurity. ROM compares the cost of mitigating risks
to the potential financial losses from cyber incidents,
providing a clear metric to measure how security efforts
protect businesses from costly breaches.
Read more about the concept in the SANS White Paper: Human-Powered Security Testing.
Recommendations
Track your response times, your ability to stay within your agreed SLAs to remediate
vulnerabilities, and your time to bounty payout to understand the health of your program and
efficacy of your processes.
Understand the goals and success metrics of your different stakeholders, from engineering
teams to the board, so you can align your reporting to their priorities and focus areas.
Adopt a return-on-mitigation strategy to effectively put an avoided incident into financial terms.
Security Leader
Media & Entertainment Industry
The collaboration between researchers and organizations is resulting in more high and
critical vulnerabilities discovered than ever before. However, a successful reduction of
the most easily avoidable vulnerabilities is going to take a more concerted approach to
examine which vulnerabilities are most prevalent in your organization, their causes,
where they’re introduced, and the tactics to phase them out of development. AI will
likely play a significant role in elevating security teams’ ability to manage vulnerability
reports and fixes. Meanwhile, the researcher community will be crucial in ensuring the
safety and integrity of the AI tools we’re coming to rely on.
HackerOne is firmly behind these efforts and we strive for a safer internet where
cross-site scripting and improper authentication are things of the past and instead our
researchers are incentivized to maximize their human skill and creativity, finding the
most novel and exclusive vulnerabilities.
contact us
[email protected]
About HackerOne
HackerOne is the global leader in human-powered, AI-enabled security, fueled by the
creativity of the world’s largest community of security researchers plus cutting-edge
AI to protect your digital assets. The HackerOne Platform combines the expertise of
our elite community and the most up-to-date vulnerability database to pinpoint
critical security flaws across your attack surface. Our integrated solutions—including
bug bounty, pentesting, code security audits, spot checks, and AI red teaming—
ensure continuous vulnerability discovery and management throughout the software
development life cycle. Trusted by industry leaders such as Coinbase, General
Motors, GitHub, Goldman Sachs, Hyatt, PayPal, Snap Inc., and the U.S. Department
of Defense, HackerOne was named a Best Workplace for Innovators by Fast
Company in 2023 and a Most Loved Workplace for Young Professionals in 2024.
Hacker-Powered
Security Report