Article Details
Scrape Timestamp (UTC): 2026-01-07 00:24:59.915
Source: https://www.theregister.com/2026/01/07/hackerone_ghosted_researcher/
Original Article Text
Click to Toggle View
HackerOne 'ghosted' me for months over $8,500 bug bounty, says researcher. Long after CVEs issued and open source flaws fixed. Last fall, Jakub Ciolek reported two denial-of-service bugs in Argo CD, a popular Kubernetes controller, via HackerOne's Internet Bug Bounty (IBB) program. Both were assigned CVEs and have since been fixed. But instead of receiving an $8,500 reward for the two flaws, Ciolek says, HackerOne ghosted him for months. The open source bug bounty program finally contacted Ciolek on Tuesday, but only after The Register reached out to HackerOne asking about the status of his reward payment and the IBB program in general. HackerOne's IBB is a crowdfunded bug bounty program that encourages researchers and maintainers to find and fix vulnerabilities in open source software by offering pooled cash payouts. Any organization that relies on open source code to run its technology or chains (in other words: everyone) can contribute to the bounty pool. Once CVE-tracked vulnerabilities are fixed, the program deducts the funds automatically and issues rewards, with 80 percent of the bounty going to the hacker who reported the bug, and 20 percent to the open source project to help fund the fix. That's how it's supposed to work, anyway. When researchers are instead met with silence - even after CVEs are issued and fixes are shipped - it undermines confidence in the entire model "When researchers are instead met with silence - even after CVEs are issued and fixes are shipped - it undermines confidence in the entire model," Ciolek told The Register. "A simple notice saying 'the program is inactive' would go a long way. Ghosting researchers does the opposite." The two high-severity denial-of-service flaws, CVE-2025-59538 and CVE-2025-59531, affect Argo CD, a GitOps continuous delivery tool for Kubernetes. If exploited, these issues could allow a remote attacker to crash vulnerable instances without any authentication. The open source project's maintainers fixed both vulnerabilities in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19, released on September 30, and credited Ciolek with reporting the flaws. Radio silence Since October, Ciolek said he tried multiple times to reach someone at HackerOne to find out when and if he'll get a payout, or if the IBB program has been paused, despite still being listed as active on the website. All of these inquiries were met with radio silence, according to Ciolek. He's not some noob either – he's got some 20 bug disclosures under his belt and earned two payouts from this bounty program last year. "I submitted the reports to HackerOne on October 30, 2025, as required by the IBB process," he told The Register. "Since then, I've repeatedly tried to get confirmation or an update from HackerOne." This includes sending messages via the platform on November 14, November 19, and December 15, he said. He also emailed the official IBB address (ibb@hackerone.com) on December 15, and reached out to an employee on December 22. "None of these attempts received a response," Ciolek said. "According to HackerOne's own IBB page, the last resolved report appears to be from roughly eight months ago." On Tuesday, however, he did receive an email from HackerOne thanking him for his patience, confirming the program remains active, and noting his bug reports remain "pending reward processing due to a temporary operational backlog." HackerOne told Ciolek it expects to resume its regularly scheduled rewards payout by the end of the first quarter or sooner. The bug bounty platform did not respond to The Register's inquiries. While it looks like Ciolek will receive a monetary award for his time and effort, the lack of communication to researchers still presents a problem. "Bug bounty programs run on trust and clarity," Ciolek said. "If a program is paused, defunded, or otherwise inactive, that's completely understandable – but it needs to be communicated." "I want to stress that I don't do vulnerability research purely for money," he added. "Most of my findings come without bounties attached. But bounties matter: they help offset the time spent auditing, documenting, and responsibly disclosing issues, and they make it easier for researchers to justify working on open-source projects that don't otherwise have funding." Ciolek also wonders if AI slop is at least partly to blame. "I suspect platforms are also dealing with increased noise - including low-quality LLM-based or automated submissions," he said. "But that makes responsiveness to valid, high-signal reports even more important, not less."
Daily Brief Summary
Jakub Ciolek reported two denial-of-service vulnerabilities in Argo CD through HackerOne's Internet Bug Bounty program, expecting an $8,500 reward.
Despite the vulnerabilities being assigned CVEs and fixed, Ciolek experienced months of silence from HackerOne regarding his reward.
The vulnerabilities, CVE-2025-59538 and CVE-2025-59531, could allow unauthenticated remote attackers to crash vulnerable Argo CD instances.
HackerOne eventually communicated that the delay was due to a temporary operational backlog, with payouts expected to resume by the end of Q1.
The incident raises concerns about trust and transparency in bug bounty programs, which rely heavily on clear communication with researchers.
Ciolek emphasizes the importance of bounties in supporting researchers' efforts, especially in open-source projects lacking direct funding.
The situation suggests potential challenges in managing increased noise from low-quality or AI-generated submissions on bug bounty platforms.