A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.
# Our security address Contact: disclosure@charanga.com Preferred-Languages: en Canonical: https://charanga.com/.well-known/security.txt # Our acknowledgments page Acknowledgments: https://charanga.com/hall_of_fame # Our security policy. Please read this before undertaking research or reporting any issues Policy: https://docs.google.com/document/d/1Nh3RnQ1WDByjz6QfGgt3Bl9l1c4lNisqUHwGbRa1OaE/ # For the avoidance of doubt, we do not consider these to be reportable issues: # # 1. Volumetric vulnerabilities (i.e. denial-of-service or overwhelming our # service with a high volume of requests) # # 2. ssh and ssh username enumeration # # 3. TLS configuration weaknesses (i.e. weak ciphersuite support, TLS1.0 # support, etc) # # 4. Use of older jQuery libraries # # 5. Email configuration (SPF, DKIM, DMARC) # # 6. Gaps in common best practice such as missing security headers (CSP, # x-frame-options, x-prevent-xss etc) # # 7. Non-exploitable vulnerabilities
This policy crawled by Onyphe on the 2020-05-12 is sorted as securitytxt.
FireBounty © 2015-2024