The Office of Navajo and Hopi Indian Relocation (ONHIR) is committed to ensuring the security of the American public by protecting their information from unwarranted disclosure. This policy is intended to give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences in how to submit discovered vulnerabilities to us. This policy describes what systems and types of research are covered under this policy, how to send us vulnerability reports, and how long we ask security researchers to wait before publicly disclosing vulnerabilities. We want security researchers to feel comfortable reporting vulnerabilities they’ve discovered – as set out in this policy – so we can fix them and keep our users safe. We have developed this policy to reflect our values and uphold our sense of responsibility to security researchers who share their expertise with us in good faith.
We request that you:
If you make a good faith effort to comply with this policy during your security research, we will consider your research to be authorized, we will work with you to understand and resolve the issue quickly, and ONHIR will not recommend or pursue legal action related to your research.
This policy applies to the following systems and services:
Any system within the ONHIR.GOV domain
Any service not expressly listed above, such as any connected services, are excluded from scope and are not authorized for testing. Additionally, vulnerabilities found in non-federal systems from our vendors fall outside of this policy’s scope and should be reported directly to the vendor according to their disclosure policy (if any). If you aren’t sure whether a system or endpoint is in scope or not, contact us at security@onhir.gov before starting your research or at the security contact for the system’s domain name listed in the .gov WHOIS.
We ask that active research and testing only be conducted on the systems covered by the scope of this document. If there is a particular system not in scope that you think merits testing, please contact us to discuss it first. We will increase the scope of this policy over time.
Vulnerability reporters will not receive payment for submitting vulnerabilities to ONHIR and that by submitting, reporters waive any claims to compensation.
The following test types are not authorized:
Information submitted under this policy will be used for defensive purposes only – to mitigate or remediate vulnerabilities.
We accept vulnerability reports at via security@onhir.gov. Reports may be submitted anonymously.
We will acknowledge receipt of your report within 3 business days.
We do not support PGP-encrypted emails at this time. For particularly sensitive information, submit security@onhir.gov.
What we would like to see from you
To help ONHIR triage and prioritize submissions, it is recommended that the researcher’s reports are prepared in the following manner:
What you can expect from us
When a researcher chooses to share your contact information with ONHIR, ONHIR is committed to coordinating with the researcher as openly and as quickly as possible.
This program crawled on the 2021-04-30 is sorted as cvd.
FireBounty © 2015-2024