Max payout:
These guidelines relate to bugs in the Trusted Execution Environment (TEE) that supports WhatsApp Private Processing.
Maximum payouts
Code execution - Vulnerabilities that enable to achieve RCE within TEE, this includes bypassing code attestation.
up to $300k* |
Privilege escalation - Vulnerabilities that enable elevation of privileges.
up to $300k* |
Data leaks - Vulnerabilities that cause data to be leaked (e.g. external storage, or memory leaks that contain user data).
up to $150k* |
Maximum payouts
Vulnerabilities that enable escapes to the host.
up to $300k* |
Maximum payouts
Vulnerabilities that enable a malicious user to persist access to a workload.
up to $10k* |
The above payouts are based on attack scenarios involving external threat actions, vulnerabilities limited to internal attack scenarios will follow the guidelines displayed in the table below.
Category | Subcategory | Payout |
TEE runtime attacks | Code execution | up to $50k* |
TEE runtime attacks | Privilege escalation | up to $50k* |
TEE runtime attacks | Data leaks | up to $50k* |
VM escape | N/A | Persistence | up to $5k* |
All issues must demonstrate a realistic attack vector under adversarial conditions.