Banner object (1)

Hack and Take the Cash !

745 bounties in database
25/04/2019
Python Cryptographic Authority logo

Python Cryptographic Authority

This page can be used for reporting security vulnerabilities in any of the Python Cryptographic Authority family of libraries, as well as our infrastructure (e.g. Jenkins we run).

Because we're building libraries for security, we take a very broad view of what constitutes a security vulnerability. Our definition for a vulnerability is:

Anytime it’s possible to write code using the library's public API which does not provide the guarantees that a reasonable developer would expect it to based on our documentation.

For our Jenkins, we are interested in any vulnerabilities that allow an attacker to mutate our infrastructure or would allow them to interfere with artifacts from our release process (e.g. by changing Jenkins' configuration or gaining persistent code execution on our workers).

For our other web properties we are interested in any typical web vulnerabilities, please note that our websites are all (so far as we know) static.

Disclosure policy

  • Please report issues here, with enough information for us to reproduce (or analytically understand) and for us to resolve them.
  • We'll endeavor to respond as quickly as possible, and come up with a solution.
  • For issues in our open source libraries, we'll always credit reporters in our changelog and in CVEs.

Exclusions

The following findings do not qualify:

  • Stack traces from Jenkins (unless they contain non-public information). All of the Jenkins code we run is open source, so there is no information disclosure here.
  • Web vulnerabilities that do not impact modern browsers (i.e. a vulnerability that only impacts IE9 would not qualify).
Thanks
Gift
Hall of Fame
Reward


List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2015-2019