All you need to plan and schedule your social media posts
Engage like never before with customers on social media
Analyze the performance of your social media marketing
Learn more about our company and team
Thoughts on social media and online marketing
Our journey toward a happier, more productive work culture
Most Common Questions
Can I reply to my audience through Buffer?
Buffer manages your publishing and analytics. We do have a separate product, Reply, which allows you to engage with your audience on Twitter & Facebook.
Can I bulk upload my posts to Buffer?
Yes! Buffer intergrates with a tool called Bulk Buffer, which allows you to bulk upload your posts and save even more time.
What payment methods does Buffer accept?
Buffer accepts all major credit cards and pre-paid cards. You can also pay through your iTunes account. Unfortunately we are not able to accept payments via PayPal nor are we able to issue invoices and receive checks as payment. We're really sorry for the limitations there. We'd love to explore more payment methods in the future!
We know how much work goes in to pen testing! To avoid frustration, you can check out these common non-vulnerabilities that don't qualify for rewards.
Got a valid issue? Awesome! Please include:
A summary of the problem
A severity rating of 1 - 5 (1 being least severe, 5 being most ie. you can easily hijack, impersonate or access any other account or data)
A PoC or breakdown of how to replicate the issue
The operating system name and version as well as the web browsers name and version that you used to replicate the issue
If you plan to provide access tokens, secure cookies or sensitive data/logs as an example, we kindly ask you to let us know and we will provide our GPG public key to you.
We're eternally grateful for all of those who put in hard work to identify weaknesses within Buffer. For reports that are not common non-vulnerabilities, we like to reward those who responsibly disclose vulnerabilities with an acknowledgement, swag or bounty money.
We appreciate the work that goes into finding and disclosing security flaws in Buffer and would like to thank the following individuals and organizations:
We've been working closely with Egor and his team at Sakurity to identify key weaknesses within our app. They've continuously proven to be experts in identifying OAuth weaknesses. They have helped us identify and resolve potential security holes such as account hijacking, access token leaks, XSS and CSRF exploits.