Recon in 2 minutes and got $250 easy

Mar 31, 2019 · 2 min read

hi bug hunters,

Today I want to share how I recon to get $250 easy from snapchat.

I just open and view source code, nothing found there.

then the I search “snapchat” on Github:-

which is:-

Content-Length: 4930

Content-Security-Policy: default-src ‘none’; script-src ‘self’; object-src ‘self’ blob:; frame-src ‘self’ blob:; style-src ‘self’ ‘unsafe-inline’; img-src ‘self’ blob: data:; connect-src; font-src https: data:; report-uri /csp_violations

Content-Type: text/html; charset=iso-8859–1 Date: Thu, 05 Oct 2017 10:55:56

GMT Server: Google Frontend Status: 200

X-Cloud-Trace-Context: ef034d44a160ba53e09ed585e69745af

I look at CSP and find domain “”, I opened that domain in a browser which looks like

I just log in using my snapchat account and give a look at my cookies

my username was there without “secure flag”, I reported to snapchat and got $250 bounty within 2–3 hours.

the issue was fixed after 2 months

Note:- now cookies without flags are considered “out of scope”. Snapchat accepted that issue not all programs accept.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store