Skip to content

Conversation

@Cieper
Copy link
Member

@Cieper Cieper commented Aug 19, 2025

This updates the Responsible Disclosure Policy to align with the main document

Comment on lines 38 to 41
* Reviewing your report promptly.
* Keeping you informed about progress.
* Rewarding you when appropriate.
* Never taking legal action against responsible researchers.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Reviewing your report promptly.
* Keeping you informed about progress.
* Rewarding you when appropriate.
* Never taking legal action against responsible researchers.
- Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
- Avoid impacting user data or privacy.
- No social engineering or physical testing.
- Keep your findings confidential until we’ve had a chance to fix the issue.

* Keeping you informed about progress.
* Rewarding you when appropriate.
* Never taking legal action against responsible researchers.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Reviewing your report promptly.
- Keeping you informed about progress.
- Rewarding you when appropriate.
- Never taking legal action against responsible researchers.

Comment on lines 45 to 51
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

Comment on lines 30 to 37
## What We Expect
We ask all researchers to follow these basic rules:
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.

If you play by the rules, we commit to:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## What We Expect
We ask all researchers to follow these basic rules:
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.
If you play by the rules, we commit to:
- A secure and trusted platform for disclosure of vulnerabilities.
- Structured communication and feedback.
- Bounty rewards for accepted reports and easy payout.
- Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

@github-actions
Copy link
Contributor

Cieper and others added 2 commits August 19, 2025 13:26
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Comment on lines 23 to 26
* A detailed list of in-scope and out-of-scope systems
* Rules of engagement for security testing
* Submission guidelines
* Potential rewards for eligible findings
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A detailed list of in-scope and out-of-scope systems
* Rules of engagement for security testing
* Submission guidelines
* Potential rewards for eligible findings
- A detailed list of in-scope and out-of-scope systems
- Rules of engagement for security testing
- Submission guidelines
- Potential rewards for eligible findings

- Your name/handle and a link for recognition in our Hall of Fame.

If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E).
You can find the current scope and testing guidelines directly on our Intigriti page.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
You can find the current scope and testing guidelines directly on our Intigriti page.
You can find the current scope and testing guidelines directly on our Intigriti page.

Comment on lines 33 to 40
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.

If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.
If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
- Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
- Avoid impacting user data or privacy.
- No social engineering or physical testing.
- Keep your findings confidential until we’ve had a chance to fix the issue.

* Keeping you informed about progress.
* Rewarding you when appropriate.
* Never taking legal action against responsible researchers.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Reviewing your report promptly.
- Keeping you informed about progress.
- Rewarding you when appropriate.
- Never taking legal action against responsible researchers.

Comment on lines 46 to 52
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
- A secure and trusted platform for disclosure of vulnerabilities.
- Structured communication and feedback.
- Bounty rewards for accepted reports and easy payout.
- Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

Cieper and others added 3 commits August 19, 2025 13:27
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Comment on lines 24 to 27
* A detailed list of in-scope and out-of-scope systems
* Rules of engagement for security testing
* Submission guidelines
* Potential rewards for eligible findings
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A detailed list of in-scope and out-of-scope systems
* Rules of engagement for security testing
* Submission guidelines
* Potential rewards for eligible findings
- A detailed list of in-scope and out-of-scope systems
- Rules of engagement for security testing
- Submission guidelines
- Potential rewards for eligible findings

- Your name/handle and a link for recognition in our Hall of Fame.

If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E).
You can find the current scope and testing guidelines directly on our Intigriti page.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
You can find the current scope and testing guidelines directly on our Intigriti page.
You can find the current scope and testing guidelines directly on our Intigriti page.

Comment on lines 34 to 41
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.

If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.
If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
- Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
- Avoid impacting user data or privacy.
- No social engineering or physical testing.
- Keep your findings confidential until we’ve had a chance to fix the issue.
- Reviewing your report promptly.
- Keeping you informed about progress.
- Rewarding you when appropriate.
- Never taking legal action against responsible researchers.

Comment on lines 47 to 53
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
- A secure and trusted platform for disclosure of vulnerabilities.
- Structured communication and feedback.
- Bounty rewards for accepted reports and easy payout.
- Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

Comment on lines 35 to 42
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.

If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.
If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
- Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
- Avoid impacting user data or privacy.
- No social engineering or physical testing.
- Keep your findings confidential until we’ve had a chance to fix the issue.
- Reviewing your report promptly.
- Keeping you informed about progress.
- Rewarding you when appropriate.
- Never taking legal action against responsible researchers.

Comment on lines 48 to 54
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
- A secure and trusted platform for disclosure of vulnerabilities.
- Structured communication and feedback.
- Bounty rewards for accepted reports and easy payout.
- Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

- Your name/handle and a link for recognition in our Hall of Fame.

If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E).
You can find the current scope and testing guidelines directly on our Intigriti page.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
You can find the current scope and testing guidelines directly on our Intigriti page.
You can find the current scope and testing guidelines directly on our Intigriti page.

Comment on lines 36 to 43
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.

If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
* Avoid impacting user data or privacy.
* No social engineering or physical testing.
* Keep your findings confidential until we’ve had a chance to fix the issue.
If you play by the rules, we commit to:
* Reviewing your report promptly.
* Keeping you informed about progress.
- Do not exploit vulnerabilities beyond what is necessary for proof-of-concept.
- Avoid impacting user data or privacy.
- No social engineering or physical testing.
- Keep your findings confidential until we’ve had a chance to fix the issue.
- Reviewing your report promptly.
- Keeping you informed about progress.
- Rewarding you when appropriate.
- Never taking legal action against responsible researchers.

Comment on lines 49 to 55
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* A secure and trusted platform for disclosure of vulnerabilities.
* Structured communication and feedback.
* Bounty rewards for accepted reports and easy payout.
* Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.
- A secure and trusted platform for disclosure of vulnerabilities.
- Structured communication and feedback.
- Bounty rewards for accepted reports and easy payout.
- Optional anonymity for researchers.
By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved.
Thanks for helping us make Hypernode more secure for all our users.
We appreciate your time, your skills, and your ethical approach.

Cieper and others added 2 commits August 19, 2025 13:28
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
- We are aware not all our domains have complete SPF / DKIM / DMARC setups.
- We are aware our marketing domains contain social media links are missing 'noopener' attributes, and can placed in iframes.
## What We Expect
We ask all researchers to follow these basic rules:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
We ask all researchers to follow these basic rules:
We ask all researchers to follow these basic rules:

@github-actions
Copy link
Contributor

…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
@github-actions
Copy link
Contributor


If you believe you’ve found a security vulnerability in one of our products or platforms please send it to us by emailing disclosure@nl.team.blue. Please include the following details with your report:
## Why Intigriti?
Using Intigriti benefits both sides:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Using Intigriti benefits both sides:
Using Intigriti benefits both sides:

@github-actions
Copy link
Contributor

@github-actions
Copy link
Contributor

…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
@github-actions
Copy link
Contributor

…policy.md

Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
@github-actions
Copy link
Contributor

@github-actions
Copy link
Contributor

@github-actions
Copy link
Contributor

@github-actions
Copy link
Contributor

Copy link
Collaborator

@moon-hn moon-hn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good.

Copy link
Collaborator

@moon-hn moon-hn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good

@Cieper Cieper merged commit ac1b601 into master Aug 19, 2025
9 checks passed
@Cieper Cieper deleted the intigriti branch August 19, 2025 15:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

3 participants