Open Source · Claude Code Plugin · Free

AI that hunts bugs.
Writes the report.
You collect.

Open-source Claude Code plugin. Recon, twenty vuln classes, CVSS scoring, and a submission-ready report for HackerOne, Bugcrowd, Intigriti, and Immunefi. Runs in your terminal.

2k+ stars · 360+ forks · MIT licensed
bughunter ~ live
cvss scored. ready to submit.
vuln-2026-pkce HIGH · 8.2
PKCE Bypass in OAuth Callback
███ ████████ ████ ███ █████████ ████ ████ ████ ████ ██ ███████ ███████ ████ ██████ █████ ████████ ██████ ████ ██ ████ █████ ██████ ███ ████████ █████ ████ ██████ ██
H1 · BUGCROWD · INTIGRITI · IMMUNEFI
01_HOW_IT_WORKS

Three steps. One command. A report.

No dashboards. No signup. No SaaS bill. You run it inside Claude Code, point it at a target, and walk away.

Step 01 — Install
One command inside Claude Code

Clone the repo, run the installer, you are ready. No SaaS signup. No keys to share.

git clone https://github.com/shuvonsec/claude-bug-bounty && cd claude-bug-bounty && ./install.sh
Step 02 — Point
Drop in a domain or program

Hand it a target. The tool pulls in-scope assets from HackerOne, Bugcrowd, Intigriti, YWH, and Immunefi.

hunt example.com
Step 03 — Collect
Get a submission-ready report

Recon, scan, validate, write. CVSS scored. H1, Bugcrowd, Intigriti, or Immunefi format.

✓ report.md ready

That is the entire workflow.

02_YOUR_FIRST_BUG

First finding in ten minutes.

From a clean Claude Code install to a report sitting in your H1 inbox.

00:00
Install
Claude Code + plugin command
02:00
Pick target
From your H1 or Bugcrowd dashboard
03:00
Run hunt
Walk away. Come back to a report.
10:00
Submit
Review the report, paste, submit.

Most of that time is the tool running.
Your hands-on time is under three minutes.

03_CAPABILITIES

What it actually does.

Eight technical capabilities. No fluff. Every line is a feature that ships today.

Recon pipeline

Subdomain enum, DNS resolution, live host detection, URL crawling. Pulls in-scope assets via bbscope.

Twenty vuln classes

IDOR, SSRF, XSS, SQLi, RCE, OAuth, race conditions, GraphQL, SAML/SSO, CI/CD, and 10 more.

Auth-aware hunting

Set session once with --cookie, --bearer, or env vars. Every downstream tool carries it.

CVSS 4.0 scoring

Built-in calculator. H1 uses 3.1, every other platform uses 4.0. Enforced automatically.

Submission-ready reports

Templates for H1, Bugcrowd, Intigriti, Immunefi. Burp Suite style HTML also supported.

Hunt memory

Persistent across sessions. Remembers every endpoint tested, feeds it back on the next run.

Validation gates

7-question gate + 4 validation gates. Auto-kills informational findings before submission.

MCP integrations

Burp MCP for live browser traffic. HackerOne MCP for program intel. Missing tools are skipped, not errors.

04_FAQ

Questions, answered.

Is it really free?

The open-source plugin on GitHub is free and will stay free. You only pay for your own Claude Code usage, which is the standard Anthropic API cost. No subscription, no signup, no credit card on this site.

What does it cost to run a hunt?

Depends on target size and scan depth. A typical small-to-medium target hunt sits in the low single-digit dollars of Claude API usage. Bigger enterprise scopes go higher. You control the budget by scoping the target.

Does it work with my existing Burp setup?

Yes. There is a Burp MCP integration. The tool reads your live browser traffic and uses it for auth-aware testing.

Will this get me banned from a program?

The tool respects scope and rate limits. Validation gates kill informational findings before submission. You are still responsible for staying inside program rules. Always read the program scope before running.

Does it submit reports automatically?

No. It writes the report and saves it locally. You review and submit yourself. That is by design.

Can I contribute?

Yes. The repo is MIT-licensed. PRs welcome. Roadmap, open issues, and contributor guide are all on GitHub.

What about the $BUG token?

The open-source tool is free regardless of the token. The token is for the hosted version of the autonomous agent that ships next. See the roadmap below.

05_ROADMAP_AND_TOKEN

Where this is going.

No dates. No quarters. Just direction.

What's next

Now · Live
  • Open-source Claude Code plugin
  • Manual hunt via hunt <target> command
  • Twenty vuln classes, four platform report formats
  • Persistent hunt memory across sessions
Later
  • Hosted version with team workspaces
  • Token-gated premium runs for high-volume hunters
  • Webhook delivery to H1 and Bugcrowd workflow

About $BUG

$BUG

Utility token for the hosted version of BugHunter.Fun. The open-source tool on GitHub is free and always will be. The token gates access to the hosted autonomous agent and team workspaces when those ship.

Contract: [REDACTED]
Chain: Solana
Status: Hosted version in development

Skip the grunt work.
Start collecting.

Open source. Free. Runs in your terminal. Submission-ready reports for the four biggest bug bounty platforms.

$ git clone https://github.com/shuvonsec/claude-bug-bounty && cd claude-bug-bounty && ./install.sh Click to copy