TradingView Bug Bounty Program

If you have found a security bug and want to report it to us, please email us at

The scope of the program

We offer rewards for reports about security vulnerabilities in our services, infrastructure, web and mobile applications

Your research can cover: as well subdomains
Native iOS app
Native Android app
Charting Library and Trading Terminal


Your reward will depend on the vulnerability discovered as well as its security impact. See details below.
up to$1500
Vulnerability affects our entire service
  • Remote code execution (RCE)
  • Gaining administrator access
  • Injections with significant impact
  • Unrestricted access to local files or databases
  • Server side request forgery (SSRF)
  • Critical information disclosure
up to$700
Vulnerability does not require user interaction and affects many users
  • Stored Cross-Site Scripting (XSS) with significant impact
  • An authentication bypass that allows change of user data or access to private data
  • Insecure Direct Object References (IDOR)
up to$300
Vulnerability requires user interaction or affects individual users
  • Cross-Site Scripting (XSS), except self-XSS
  • Cross-Site Request Forgery (CSRF)
  • URL redirection
  • User reputation manipulation
Note that reward amounts can be different. An actual reward may vary depending on the severity, genuineness and exploitation possibilities of bugs as well as the environment and other factors that affect the security.

Vulnerabilities of auxiliary services such as Wiki, Blog etc. and vulnerabilities of non-production environments such as 'beta', 'staging', 'demo' etc. are rewarded only when they affect our service as a whole or may cause sensitive user data leakage.

You will need a PayPal ID as we use PayPal to issue rewards.

You will NOT receive a reward for the discovery of the following vulnerabilities:

  • You are not the first one to report this vulnerability;
  • Vulnerabilities in user's software or vulnerabilities that require full access to user’s software, account/s, email, phone etc.;
  • Vulnerabilities or leaks in third-party services;
  • Vulnerabilities or old versions of third party software/protocols, missed protection as well as a deviation from best practices that doesn’t create a security threat;
  • Vulnerabilities with no substantial security impact or exploitation possibility;
  • Vulnerabilities that require the user to perform unusual actions;
  • Disclosure of public or non-sensitive information;
  • Homograph attacks;
  • Vulnerabilities that require rooted, jailbroken or modified devices and applications.


  1. You should not disclose a bug before you receive an approval from us. Please be patient as reports are reviewed within two weeks and we need time to fix the bug/s.
  2. A bug report should include a detailed description of the discovered vulnerability and steps that need to be taken in order to reproduce it or a working proof-of-concept. If you do not describe vulnerability details then it could take a long time to review the report and/or could result in a rejection of your report.
  3. You should not use automated tools and scanners to find vulnerabilities as such reports will not be reviewed.
  4. You should not perform any attack that could damage our services or data including client data. DDoS, spam, brute force attacks are not permitted.
  5. You should not involve other users without their explicit consent.
  6. You should not perform or try to perform non-technical attacks such as social engineering, phishing or physical attacks against our employees, users or infrastructure.
Home Stock Screener Forex Screener Crypto Screener Economic Calendar How It Works Chart Features Pricing House Rules Moderators Website & Broker Solutions Widgets Charting Solutions Help Center Feature Request Blog & News FAQ Wiki Twitter
Profile Profile Settings Account and Billing TradingView Coins My Support Tickets Help Center Ideas Published Followers Following Private Messages Chat Sign Out