Skip links

HackerOne ‘ghosted’ me for months over $8,500 bug bounty, says researcher

Last fall, Jakub Ciolek reported two denial-of-service bugs in Argo CD, a popular Kubernetes controller, via HackerOne’s Internet Bug Bounty (IBB) program. Both were assigned CVEs and have since been fixed. But instead of receiving an $8,500 reward for the two flaws, Ciolek says, HackerOne ghosted him for months.

The open source bug bounty program finally contacted Ciolek on Tuesday, but only after The Register reached out to HackerOne asking about the status of his reward payment and the IBB program in general.

HackerOne’s IBB is a crowdfunded bug bounty program that encourages researchers and maintainers to find and fix vulnerabilities in open source software by offering pooled cash payouts. Any organization that relies on open source code to run its technology or chains (in other words: everyone) can contribute to the bounty pool.

Once CVE-tracked vulnerabilities are fixed, the program deducts the funds automatically and issues rewards, with 80 percent of the bounty going to the hacker who reported the bug, and 20 percent to the open source project to help fund the fix.

That’s how it’s supposed to work, anyway.

When researchers are instead met with silence – even after CVEs are issued and fixes are shipped – it undermines confidence in the entire model

“When researchers are instead met with silence – even after CVEs are issued and fixes are shipped – it undermines confidence in the entire model,” Ciolek told The Register. “A simple notice saying ‘the program is inactive’ would go a long way. Ghosting researchers does the opposite.”

The two high-severity denial-of-service flaws, CVE-2025-59538 and CVE-2025-59531, affect Argo CD, a GitOps continuous delivery tool for Kubernetes. If exploited, these issues could allow a remote attacker to crash vulnerable instances without any authentication. 

The open source project’s maintainers fixed both vulnerabilities in versions 2.14.20, 3.2.0-rc2, 3.1.8 and 3.0.19, released on September 30, and credited Ciolek with reporting the flaws.

Radio silence

Since October, Ciolek said he tried multiple times to reach someone at HackerOne to find out when and if he’ll get a payout, or if the IBB program has been paused, despite still being listed as active on the website. All of these inquiries were met with radio silence, according to Ciolek. He’s not some noob either – he’s got some 20 bug disclosures under his belt and earned two payouts from this bounty program last year.

“I submitted the reports to HackerOne on October 30, 2025, as required by the IBB process,” he told The Register. “Since then, I’ve repeatedly tried to get confirmation or an update from HackerOne.”

This includes sending messages via the platform on November 14, November 19, and December 15, he said. He also emailed the official IBB address (ibb@hackerone.com) on December 15, and reached out to an employee on December 22.

“None of these attempts received a response,” Ciolek said. “According to HackerOne’s own IBB page, the last resolved report appears to be from roughly eight months ago.”

On Tuesday, however, he did receive an email from HackerOne thanking him for his patience, confirming the program remains active, and noting his bug reports remain “pending reward processing due to a temporary operational backlog.”

HackerOne told Ciolek it expects to resume its regularly scheduled rewards payout by the end of the first quarter or sooner. 

The bug bounty platform did not respond to The Register‘s inquiries. 

While it looks like Ciolek will receive a monetary award for his time and effort, the lack of communication to researchers still presents a problem. 

“Bug bounty programs run on trust and clarity,” Ciolek said. “If a program is paused, defunded, or otherwise inactive, that’s completely understandable – but it needs to be communicated.”

“I want to stress that I don’t do vulnerability research purely for money,” he added. “Most of my findings come without bounties attached. But bounties matter: they help offset the time spent auditing, documenting, and responsibly disclosing issues, and they make it easier for researchers to justify working on open-source projects that don’t otherwise have funding.”

Ciolek also wonders if AI slop is at least partly to blame.

“I suspect platforms are also dealing with increased noise – including low-quality LLM-based or automated submissions,” he said. “But that makes responsiveness to valid, high-signal reports even more important, not less.” ®

Source