No technology is perfect, and Ramp believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Please do not sign up for a new account solely for the purpose of testing under this VDP. The account will be rejected during onboarding. Qualified security researchers may access test accounts via a private HackerOne bug bounty program.
In some cases - your submission may be marked as duplicate or already reported. Ramp is either already working on remediation or has determined the issue to be non-material and risk accepted.
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
Use of automated scanners and tools to find vulnerabilities is strictly not allowed. Ramp requests that testers do not perform automated/scripted testing of web forms, especially "Contact Us" forms that are designed for customers to contact the Support team.
If your testing or investigation inadvertently causes a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information), please include this information in your report (or email privacy@ramp.com)
While researching, we'd like to ask you to refrain from:
Denial of service
Spamming
Social engineering (including phishing) of Ramp staff or contractors
Any physical attempts against Ramp property or data centers
In order for the team to focus on urgent matters, please refrain from reporting low or informational findings such as:
Email spoofing
Missing or incorrect SPF/DMARC/DKIM records of any kind
Descriptive error messages (e.g. Stack traces, application or server errors)
Fingerprinting/banner disclosure on common/public services
Clickjacking and issues only exploitable through clickjacking
Login/Logout/Unauthenticated/low-impact/anonymous user CSRF
Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality
Lack of Secure/HTTPOnly flags on non-sensitive Cookies
Forgot Password page brute force and account lockout not enforced
OPTIONS HTTP method enabled
Username / email enumeration
via Login Page error message
via Forgot Password error message
Any missing HTTP security headers
SSL Issues
Vulnerabilities affecting users of outdated browsers
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Ramp and our users safe!
Scope Type | Scope Name |
---|---|
web_application | ramp.com |
web_application | ramp.com/get-ramp |
This program crawled on the 2021-10-20 is sorted as bounty.
FireBounty © 2015-2024