Bug Bounty Programme-UIDAI
 
Why in News?
On March 11, 2026, the Unique Identification Authority of India (UIDAI) has officially launched its first structured Bug Bounty Programme
 

About
  • Official Launch: The programme was announced to further fortify the security of the Aadhaar ecosystem, which is the cornerstone of India's digital identity.
  • Expert Panel Selection: A specialized panel of 20 experienced cybersecurity researchers and ethical hackers has been selected to probe key digital assets for vulnerabilities.
  • Strategic Partnership: The initiative is being implemented in collaboration with M/s ComOlho IT Private Limited, a cybersecurity solutions provider.
Scope and Targeted Assets
The programme invites researchers to identify and responsibly report security gaps in specific UIDAI digital platforms, including: 
  • Official UIDAI Website: The primary information hub for residents.
  • myAadhaar Portal: The interface used by citizens for various Aadhaar-related services.
  • Secure QR Code Application: The tool used for offline verification of Aadhaar data. 
Reward Structure
  • Severity-Based Payouts: Rewards are distributed based on the seriousness of the identified vulnerability.
  • Risk Categorization: Potential security gaps are classified into four categories: Critical, High, Medium, and Low risk.
  • Global Alignment: The payout model aligns with standard practices used by major global technology platforms to incentivize high-quality research. 
Eligibility and Selection Criteria
Participation is highly selective to ensure a "secure and authorized environment": 
  • Top-Tier Talent: Candidates must typically be listed in the top 100 of global bug bounty leaderboards (such as HackerOne or Bugcrowd) or have a proven track record with companies like Google, Microsoft, or Apple.
  • Vetting Process: Shortlisted researchers undergo background verification, which includes proof of Indian Citizenship and a signed Non-Disclosure Agreement (NDA).
  • Conflict of Interest: Current or former employees of UIDAI or its contracted technology support partners (within the last 7 years) are ineligible to participate. 
Objectives and Implementation
  • Proactive Defense: The goal is to move from reactive patching to a proactive strategy by identifying "hidden risks" before they can be exploited by malicious actors.
  • Layered Security: This programme serves as an additional layer of protection, complementing UIDAI's existing measures like regular security audits, vulnerability assessments, and continuous monitoring.
  • Triage and Validation: The partner, ComOlho IT, manages the submission process, validates findings, and facilitates communication between the "bounty hunters" and the UIDAI Tech Centre in Bengaluru.

Download Pdf
Get in Touch
logo Get in Touch