Submit your research.
If you believe you’ve discovered a security or privacy vulnerability that affects Apple devices, software, or services, please report it directly to us. We review all eligible research for Apple Security Bounty rewards. And with our online tools, submitting and tracking your reports is easier than ever.