-
Notifications
You must be signed in to change notification settings - Fork 36
Update Responsible Disclosure #395
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| * Rewarding you when appropriate. | |
| * Never taking legal action against responsible researchers. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. |
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| ## What We Expect | ||
| We ask all researchers to follow these basic rules: | ||
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| ## What We Expect | |
| We ask all researchers to follow these basic rules: | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
| * A detailed list of in-scope and out-of-scope systems | ||
| * Rules of engagement for security testing | ||
| * Submission guidelines | ||
| * Potential rewards for eligible findings |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A detailed list of in-scope and out-of-scope systems | |
| * Rules of engagement for security testing | |
| * Submission guidelines | |
| * Potential rewards for eligible findings | |
| - A detailed list of in-scope and out-of-scope systems | |
| - Rules of engagement for security testing | |
| - Submission guidelines | |
| - Potential rewards for eligible findings |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. |
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
| * A detailed list of in-scope and out-of-scope systems | ||
| * Rules of engagement for security testing | ||
| * Submission guidelines | ||
| * Potential rewards for eligible findings |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A detailed list of in-scope and out-of-scope systems | |
| * Rules of engagement for security testing | |
| * Submission guidelines | |
| * Potential rewards for eligible findings | |
| - A detailed list of in-scope and out-of-scope systems | |
| - Rules of engagement for security testing | |
| - Submission guidelines | |
| - Potential rewards for eligible findings |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
| - We are aware not all our domains have complete SPF / DKIM / DMARC setups. | ||
| - We are aware our marketing domains contain social media links are missing 'noopener' attributes, and can placed in iframes. | ||
| ## What We Expect | ||
| We ask all researchers to follow these basic rules: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| We ask all researchers to follow these basic rules: | |
| We ask all researchers to follow these basic rules: |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
|
||
| If you believe you’ve found a security vulnerability in one of our products or platforms please send it to us by emailing disclosure@nl.team.blue. Please include the following details with your report: | ||
| ## Why Intigriti? | ||
| Using Intigriti benefits both sides: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Using Intigriti benefits both sides: | |
| Using Intigriti benefits both sides: |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
moon-hn
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good.
moon-hn
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good
This updates the Responsible Disclosure Policy to align with the main document