Security at Buffer

If you discover a security vulnerability in Buffer, we'd love to hear from you! Reply is temporarily excluded from our program :)

Report an Issue

Reporting an issue

We know how much work goes in to pen testing! To avoid frustration, you can check out these common non-vulnerabilities that don't qualify for rewards.

Got a valid issue? Awesome! Please include:

  • A summary of the problem
  • A severity rating of 1 - 5 (1 being least severe, 5 being most ie. you can easily hijack, impersonate or access any other account or data)
  • A PoC or breakdown of how to replicate the issue
  • The operating system name and version as well as the web browsers name and version that you used to replicate the issue

GPG Encryption

If you plan to provide access tokens, secure cookies or sensitive data/logs as an example, we kindly ask you to let us know and we will provide our GPG public key to you.


We're eternally grateful for all of those who put in hard work to identify weaknesses within Buffer. For reports that are not common non-vulnerabilities, we like to reward those who responsibly disclose vulnerabilities with an acknowledgement, swag or bounty money.


We appreciate the work that goes into finding and disclosing security flaws in Buffer and would like to thank the following individuals and organizations:

  • Sakurity - Security Consulting
    • We've been working closely with Egor and his team at Sakurity to identify key weaknesses within our app. They've continuously proven to be experts in identifying OAuth weaknesses. They have helped us identify and resolve potential security holes such as account hijacking, access token leaks, XSS and CSRF exploits.