Apple Security Bounty Categories
Apple Security Bounty reward payments are made at Apple’s sole discretion and are based on the type of issue, the level of access or execution achieved, and the quality of the report. A high-quality research report is critical to help us confirm and address an issue quickly, and could help you receive an Apple Security Bounty reward.
The examples shown for each category are representative of potential Apple Security Bounty payments. While we’re unable to anticipate specific reward payments in advance, we consider every security issue that has a significant impact to users for an Apple Security Bounty reward, even if it doesn’t match a published category.