Welcome to the Final Bug Bounty Platform

community icon

Do you want to be part of the community?

professional icon

Do you want the best professionals?


The opportunity to optimize your cybersecurity with epic bounties.

gears icon
your budget

It will only consume budget by adding new identified vulnerabilities identified.

clock icon
Allows to adjust

By regulating the number of participating researchers, the search can be accelerated to the maximum.

security icon

Select vulnerabilities in a fully customisable way and real vulnerabilities.

growth chart icon

Real time results

Select vulnerabilities in a fully customized way.

How it Works?

1. The companies publish their programs

The assets that companies need to protect will be published from their private platform. from its private platform. The company will have a streamlined process optimised process, which will make it possible to facilitate and delimit the programme according to their needs in a comprehensive manner.

2. The hunters experts will look for vulnerabilities

The programme will be accessible to the expert community best suited to the needs of the programme. best suited to the needs of the programme. The best hunters in each will provide their expertise in the search for vulnerabilities in the asset. asset.

3. It generates an appropriate report for the company

Each time a vulnerability is found, it is reported through the platform in professional the platform as a professional report for verification. The platform itself facilitates this process in order to guarantee the highest quality of the results delivered.

4. The hunter is rewarded for every vulnerability found

If the vulnerability exists and has been validated with the requirements of the the hunter receives the corresponding reward for his work. work. In this way the company only pays for the vulnerabilities found, and the hunter is rewarded according to the success of his appropriate to the success of his participation in the programme.

Our team

Jose Ramon Palanco


Serial Cybersecurity entrepreneur and Researcher. One of its start ups, Dinoflux, was acquired by Telefónica.

Jaime Restrepo

Bussiness Partner

Estrategic, Innovation and Community advisor. Founder of DragonJAR and reference among the hunter community.

Antonio Lopez


Entrepreneur and passionate about technology and cybersecurity. He is also co-founder of the Nice1 Blockchain project.

Adolfo Coronado

Financial Controller

Responsible for monitoring the company's Business Plan and budgets, as well as coordinating legal aspects of the company.

Raquel Guirado


Responsible for the online and offline marketing area of the project. Leads a multidisciplinary team.

Articles about Bug Bounty

José Palanco, CEO at Epic Bounties

José Ramón Palanco, CEO of Epic Bounties, has a clear objective with the platform: to make Epic Bounties the world’s leading Spanish-speaking platform in the hotly contested market of cybersecurity bug bounty programmes.

Read more
Cybersecurity risk management

Companies are facing continuous attacks on the security of their assets on a daily basis. During ...

Read more
Main keys in a bug bounty program

Bug bounty programs are a pay-for-performance approach to proactive security testing designed to ...

Read more
Vulnerability disclosure program. Why is it so important for CISOS?

What is a vulnerability disclosure program? A Vulnerability disclosure program (VDP) is a proces...

Read more


I'm a customer

I'm a hunter

By submitting this form you are agreeing to our Privacy policy..