PINGDOM_CHECK

#ExtractSummit2026 The world's largest web scraping conference returns. Austin Oct 7–8 · Dublin Nov 10–11.

Register now
Data Services
Pricing
Login
Try Zyte APIContact Sales
  • Unblocking and Extraction

    Zyte API

    The ultimate API for web scraping. Avoid website bans and access a headless browser or AI Parsing

    Ban Handling

    Headless Browser

    AI Extraction

    Enterprise

    DocumentationSupport

    Hosting and Deployment

    Scrapy Cloud

    Run, monitor, and control your Scrapy spiders however you want to.

    Coding Agent Add-Ons

    Agentic Web Data

    Plugins that give coding agents the context to build production Scrapy projects. Starts with Claude Code.

  • Data Services
  • Pricing
  • Blog

    Learn

    Case Studies

    Webinars

    Videos

    White Papers

    Join our Community
    Web scraping APIs vs proxies: A head-to-head comparison
    Blog Post
    The seven habits of highly effective data teams
    Blog Post
  • Product and E-commerce

    From e-commerce and online marketplaces

    Data for AI

    Collect and structure web data to feed AI

    Job Posting

    From job boards and recruitment websites

    Real Estate

    From Listings portals and specialist websites

    News and Article

    From online publishers and news websites

    Search

    Search engine results page data (SERP)

    Social Media

    From social media platforms online

  • Meet Zyte

    Our story, people and values

    Contact us

    Get in touch

    Support

    Knowledge base and raise support tickets

    Terms and Policies

    Accept our terms and policies

    Open Source

    Our open source projects and contributions

    Web Data Compliance

    Guidelines and resources for compliant web data collection

    Join the team building the future of web data
    We're Hiring
    Trust Center
    Security, compliance & certifications
Login
Try Zyte APIContact Sales

Zyte Developers

Coding tools & hacks straight to your inbox

Become part of the community and receive a bi-weekly dosage of all things code.

Join us
    • Zyte Data
    • News & Articles
    • Search
    • Social Media
    • Product
    • Data for AI
    • Job Posting
    • Real Estate
    • Zyte API - Ban Handling
    • Zyte API - Headless Browser
    • Zyte API - AI Extraction
    • Web Scraping Copilot
    • Zyte API Enterprise
    • Scrapy Cloud
    • Solution Overview
    • Blog
    • Webinars
    • Case Studies
    • White Papers
    • Documentation
    • Web Scraping Maturity Self-Assesment
    • Web Data compliance
    • Meet Zyte
    • Jobs
    • Terms and Policies
    • Trust Center
    • Support
    • Contact us
    • Pricing
    • Do not sell
    • Cookie settings
    • Sign up
    • Talk to us
    • Cost estimator

Responsible Disclosure Program(BugHunt)

Zyte is committed to maintaining the security and integrity of our products and services. We value the contributions of security researchers and the broader security community in helping us achieve this goal.


If you believe you have identified a potential security vulnerability in any Zyte product or service, we encourage you to report it to us promptly. Responsible disclosure enables us to investigate, remediate, and protect our users and their data in a timely manner.


At this time, Zyte does not offer financial rewards for the disclosure of security vulnerabilities. However, we are grateful for the efforts of those who help improve our security posture. With your permission, we would be pleased to acknowledge your contribution publicly by listing your name or handle in our Security Researcher Hall of Fame.


We sincerely appreciate your time, expertise, and commitment to responsible vulnerability disclosure.

Bug eligibility overview

Qualifying Bugs

  • Remote code execution (RCE)

  • SQL/XXE Injection and command injection

  • Cross-Site Scripting (XSS)

  • Server-side request forgery (SSRF)

  • Misconfiguration issues on servers and application

  • Authentication and Authorization related issues

  • Cross-site request forgeries (CSRF)






Non-Qualifying Bugs

  • Html injection and Self-XSS

  • Host header and banner grabbing issues

  • Automated tool scan reports.Example: Web, SSL/TLS scan, Nmap scan results, etc.,

  • Missing HTTP security headers and cookie flags on insensitive cookies

  • Rate limiting, brute force attack

  • Login/logout CSRF

  • Session timeout

  • Unrestricted file upload

  • Open redirections

  • Formula/CSV Injection

  • Vulnerabilities that require physical access to the victim machine.

  • User enumeration such as User email, User ID, etc.,

  • Phishing / Spam (including issues related to SPF/DKIM/DMARC)

  • Vulnerabilities found in third-party services

  • EXIF data not stripped on images

Domains in scope

The following domains are in scope for Zyte’s bug bounty program.
Security research and responsible disclosure efforts should be focused on these properties.
Please review the list below to ensure your testing activity targets eligible assets only.


  • zyte.com

  • app.zyte.com

  • storage.zyte.com

Disclosure Policy

  • Our security team will aim to acknowledge your email within 24 hours;

  • We may take up to 5 days to validate the reported issue;

  • Actions will be initiated to fix the vulnerability in accordance with our commitment to security and privacy. We will notify you when the issue is fixed;

  • Research should not violate our Privacy Policy, modify/delete data, or, interrupt or degrade our service;


  • Only interact with accounts you own or with the explicit permission of the account holder;

  • Perform research only within the scope set out below;

  • Documenting or publishing the vulnerability details in the public domain is against our responsible disclosure policy; and

  • Keep information about any vulnerability confidential until the issue is resolved.

Report vulnerability

Please provide the following details on the report


  • Vulnerability overview

    Description and potential impact of the vulnerability;

  • Reproduction steps and proof of concept

    A detailed description of the steps required to reproduce the vulnerability; and where available, a video POC.

  • Researcher recognition details

    Please provide your name/handle and a link for recognition if you would like to be included in our Security Researcher Hall of Fame.

Hall of Fame

G2.com

Capterra.com

Proxyway.com

EWDCI logoMost loved workplace certificateZyte rewardISO 27001 iconG2 rewardG2 rewardG2 reward

© Zyte Group Limited 2026

A spotlight honouring the security-researchers whose responsible disclosures helped make Zyte safer.

A spotlight honouring the security-researchers whose responsible disclosures helped make Zyte safer.

A spotlight honouring the security-researchers whose responsible disclosures helped make Zyte safer.

Burhan Ahmed

Zaid Raza

Subrati Swaroop

Shivam Kumar

Jebarson Immanuel J

Harsh Maheta

Mohd farzaan aqil

Shah Md Kaif

Het Patel

Faizan Ahmed

Xyele

Steffin Stanly

Teena Vijay

Gaurang maheta