Upgrade is committed to maintaining the security of our systems and our customers’ information. We appreciate and encourage security researchers to contact us to report potential vulnerabilities identified in any product, system, or asset belonging to Upgrade Inc.
During testing, please do not conduct denial-of-service (DoS) or resource-
If you believe you have identified a potential security vulnerability, please submit it pursuant to our Responsible Disclosure Program. Thank you in advance for your submission.
Please note, Upgrade does not operate a public bug bounty program; while we appreciate your efforts to find and report potential security vulnerabilities, we make no offer of reward or compensation in exchange for submitting potential issues at this time.
Researchers shall disclose potential vulnerabilities to Upgrade in accordance with the following guidelines:
When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) the security impact of the bug. The following issue is considered out of scope:
By responsibly submitting your findings to Upgrade in accordance with these guidelines Upgrade agrees not to pursue legal action against you. Upgrade reserves all legal rights in the event of noncompliance with these guidelines. Once a report is submitted, Upgrade will endeavor to provide prompt acknowledgment of receipt of all reports (typically within two business days of submission) and to keep you reasonably informed of the status of any validated vulnerability that you report through this program.
When reporting a potential vulnerability, please include a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (screen captures welcome).
|Scope Type||Scope Name|
Firebounty have crawled on 2019-08-06 the program Upgrade on the platform Hackerone.