Phase 3 of the Xiaomi HackerOne engagement ran 5,472 Nuclei templates across three live targets identified in Phase 2 — app.mi.com, b.mi.com, and market.xiaomi.com. Zero CVEs matched. Here’s what that actually means.
What We Scanned
Three live services confirmed in Phase 2:
- app.mi.com — Mi App Store (Nginx/IIS)
- b.mi.com — Xiaomi Cloud Backend (Nginx/OpenResty)
- market.xiaomi.com — Xiaomi Market (Apache/PHP 7.4 EOL)
Results
25,898 requests completed before the process was terminated at 70% due to an 8,109-error rate (22%). No vulnerabilities matched.