This tweet is asking about bug bounty programs accepting only WAF bypass vulnerabilities without any other impacts. It raises a question about the scope of bug bounty programs and their acceptance criteria. It is important for bug bounty hunters to understand the requirements of each program they participate in, as some programs may prioritize specific types of vulnerabilities over others.
Check out the original tweet here: