Tesla Motors officials vowed to investigate reports that its Model S sedan is susceptible to hacks that can remotely control the car’s locks, horn, headlights, and skylight while the car is in motion, according to a published report.

The hacks were carried out at the Syscan 360 security conference in Beijing, an article published by Bloomberg News reported. The report cited a brief post on Chinese social media site Weibo from a representative of China-based Qihoo 360 Technology Co., which said the experiment was carried out by members of the company's information technology department.

The news comes a week after Syscan 360 organizers announced a contest that promised a $10,000 bounty as part of a hacking competition involving the Tesla smartcar. As of press time, no other information was available about the specifics of the reported hacks.

"Excited for details regarding Tesla hack," Chris Valasek, director of security Intelligence for IOActive, wrote in a tweet. "My guess is webapp or mobile app based on functionality described (lights, roof, etc)."

Last year, Valasek and fellow whitehat hacker Charlie Miller demonstrated hacks that could tamper with the brakes, steering, or acceleration of Ford Escape or Toyota Prius models. Tesla's Model S has already been involved in a separate hack that made it possible to remotely track and unlock the vehicle by exploiting a weakness in an accompanying Web app. Tesla has since updated the apps to make such hacks infeasible. In February, the car manufacturer hired veteran whitehat hacker Kristin Paget , who described her job as "securing things."

According to Bloomberg, Tesla officials said they would investigate the latest hacking claims and fix any vulnerabilities that are uncovered.

"While Tesla is not associated with the conference and is not a sponsor of the competition, we support the idea of providing an environment in which responsible security researchers can help identify potential vulnerabilities," Palo Alto, California-based Tesla was quoted as saying. "We hope that the security researchers will act responsibly and in good faith."