No technology is perfect, and Dropcontact believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
While researching, we'd like to ask you to refrain from:
Denial of service
Spamming
Social engineering (including phishing) of Dropcontact staff or contractors or customers
Physical access to a Dropcontact user computer
Any physical attempts against Dropcontact property or data centers
Login/Logout CSRF
Self-XSS (we require evidence on how the XSS can be used to attack another Dropcontact user)
Miss of rate limits
Report from automated tools and scans
Vulnerabilities sending spam or unauthorized messages
Bugs in 3rd party software (Firstpromoter.com, Helpscout.com, Weglot.com...)
Dropcontact online support witch is a 3rd party software (Helpscout.com)
X-Frame-Options related
Customer's sites
Relating to HSTS
DNSSEC
Missing security headers which do not lead directly to a vulnerability
Physical attack on the infrastructure
Theoretical attacks
Breaking of SSL/TLS trust
Compromising of browser/device (ex. computer sharing, physical access to a user's device, ...)
Vulnerabilities only affecting users of outdated or unpatched browsers and platforms
Password and account recovery policies, such as reset link expiration or password complexity
Vulnerabilities without a solution on our side (HEIST, ...)
Outdated DNS record pointing to a system which does not belong to Dropcontact
Website dropcontact.com and API related endpoints on app.dropcontact.io
Do not report vunerabilities from FirstPromoteur, HelpScout, or any third party integration.
You must be the first reporter of the vulnerability.
You follow https://hackerone.com/disclosure-guidelines
You do not access data of other users and solely use your created accounts.
You may not publicly disclose the vulnerability prior to our resolution.
You are not an individual on or residing in any country on, any U.S. sanctions lists.
You provide a working proof of concept that exploits the security issue
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Thank you for helping keep Dropcontact and our users safe!
Scope Type | Scope Name |
---|---|
web_application | app.dropcontact.io |
This program crawled on the 2020-08-19 is sorted as bounty.
FireBounty © 2015-2024