Vulnerability Disclosure

Vulnerability Disclosure

Note: we do not offer monetary rewards for vulnerability disclosures

 

Promise: (In development)

Scope:  (In development)  

"Safe Harbor": (In development) 

Process: (borrowed from https://www.cpacanada.ca/en/vulnerability-disclosure-policy while we develop our own policy) 

  • Break any applicable law or regulations.

  • Access unnecessary, excessive or significant amounts of data.

  • Modify data in the Organization's systems or services.

  • Use high-intensity invasive or destructive scanning tools to find vulnerabilities.

  • Attempt or report any form of denial of service, e.g. overwhelming a service with a high volume of requests.

  • Disrupt the Organization's services or systems.

  • Submit reports detailing non-exploitable vulnerabilities, or reports indicating that the services do not fully align with “best practice”, for example, missing security headers.

  • Submit reports detailing TLS configuration weaknesses, for example, “weak” cipher suite support or the presence of TLS1.0 support.

  • Communicate any vulnerabilities or associated details other than by means described in the published security.txt.

  • Social engineer, ‘phish’ or physically attack the Organization's staff or infrastructure.

  • Demand financial compensation in order to disclose any vulnerabilities.

Preferences: (In Development)