Join our bug bounty program and help protect millions of patients' health data. We reward security researchers who responsibly disclose vulnerabilities in our systems.
Our bug bounty program is designed to identify and address security vulnerabilities in our healthcare platform through collaboration with ethical security researchers.
We believe in working together with the security community to protect our users.
Competitive bounties based on vulnerability severity and potential impact.
Safe harbor provisions protect researchers acting in good faith.
We acknowledge reports within 24 hours and provide regular updates.
We're committed to maintaining the highest security standards for healthcare data. Your contributions help protect millions of patients and healthcare providers worldwide.
Clear guidelines on what's included in our bug bounty program and the rules researchers must follow when testing our systems.
Violation of program rules may result in immediate disqualification from the bug bounty program and potential legal action. Always follow responsible disclosure practices and respect user privacy.
Our rewards are based on the severity and impact of discovered vulnerabilities, with additional bonuses for high-quality reports and exceptional findings.
Vulnerabilities that could lead to complete system compromise or massive data breach
Significant security flaws that could compromise user accounts or sensitive data
Moderate security issues that could affect individual users or system integrity
Minor security issues with limited impact but valuable for overall security posture
Detailed reproduction steps, proof of concept, and suggested fixes
First person to report a specific vulnerability class
Clear demonstration of real-world impact and exploitation
Providing code patches or detailed remediation guidance
Annual budget dedicated to rewarding security researchers who help us maintain the highest security standards for healthcare data protection.
Follow our streamlined process to report vulnerabilities and receive rewards. We've designed this process to be efficient and transparent for all researchers.
Identify potential vulnerabilities following our scope and rules
Submit detailed vulnerability report through our secure portal
Our security team reviews and acknowledges your submission
Detailed analysis and validation of the reported vulnerability
Vulnerability fix implementation and reward processing
Primary contact for vulnerability reports
For highly sensitive vulnerability reports
For critical vulnerabilities requiring immediate attention
By submitting a report, you agree to our bug bounty program terms and responsible disclosure policy.
Recognizing the outstanding security researchers who have contributed to making RGHS safer for millions of healthcare users worldwide.

@alexsec
@sarahfinds
@dkumar_sec
@emma_hacks
@mzhang_bug
@lisa_secure
Discovered the first critical vulnerability in our new patient portal
Found 5 high-severity vulnerabilities in our mobile applications
Comprehensive API security assessment with detailed remediation guide
Become part of an elite group of security researchers helping protect healthcare data. Your contributions make a real difference in patient safety and data security.