Responsible Disclosure Program

Our Responsible Disclosure Program aims to foster collaboration with security researchers to identify and address potential vulnerabilities in our systems, ensuring the security and privacy of our users and customers. We appreciate the efforts of researchers who responsibly report security issues and adhere to the guidelines outlined below.

Scope: The scope of our program includes all publicly accessible web assets owned and operated by our organization. This encompasses:

  • All web applications
  • APIs
  • Mobile applications
  • Backend infrastructure

Out of scope Asset:

What to Do:

  1. Conduct thorough testing within the scope outlined above.
  2. Report any identified vulnerabilities promptly and responsibly via email to [email protected] with the subject line prefixed with “Security Vulnerability Report”.
  3. Provide detailed information on the vulnerability, including steps to reproduce, impact, and any potential mitigations.
  4. Allow a reasonable amount of time for our security team to investigate and address the reported vulnerability before publicly disclosing it.
  5. Respect the privacy and confidentiality of our users and their data throughout the disclosure process.

What Not to Do:

  1. Do not attempt to exploit vulnerabilities beyond what is necessary for testing.
  2. Do not access, modify, or delete data that does not belong to you.
  3. Do not engage in any activity that may disrupt our services, including DDoS attacks.
  4. Do not publicly disclose the vulnerability before receiving confirmation from our security team.
  5. Do not perform automated scanning without explicit permission.

Top 10 OSWAP Vulnerabilities in Scope:

  1. Injection (e.g., SQL injection, LDAP injection)
  2. Broken Authentication
  3. Sensitive Data Exposure
  4. XML External Entities (XXE)
  5. Broken Access Control
  6. Security Misconfiguration
  7. Cross-Site Scripting (XSS)
  8. Insecure Deserialization
  9. Using Components with Known Vulnerabilities
  10. Insufficient Logging and Monitoring

Out of Scope:

  1. Physical security vulnerabilities
  2. Social engineering attacks
  3. Denial of Service attacks
  4. Third-party applications not owned or operated by our organization
  5. Anything not directly related to our web assets
  6. All the vulnerability types that are not mentioned above.

Do No Harm:

  • Under no circumstances should any actions taken during testing harm our systems, customers, or users.
  • Always use non-destructive testing methods.
  • Handle any sensitive data encountered during testing with the utmost care and confidentiality.
Subject: Security Vulnerability Report - [Brief Description]
Researcher: [Your Name]
Date: [Date of Report]
Description:
[Provide a detailed description of the vulnerability, including steps to reproduce, impact, and any potential mitigations.]
Proof of Concept:
[Include any relevant code snippets, screenshots, or videos demonstrating the vulnerability.]
Disclosure Timeline:
[Specify when the vulnerability was discovered, when it was reported, and any subsequent communications.]
Thank you for your attention to this matter.
Sincerely,
[Your Name]

Contact Information: For inquiries related to our Responsible Disclosure Program or to report a vulnerability, please get in touch with our security team at [email protected].

We may offer T-shirts and other gadgets as a swag to reports from 8-10 CVSS. Also, currently, the SWAG is only for Pakistani researchers.

Hall of Fame Acknowledgment:

We extend our heartfelt appreciation to the following individuals for their valuable contributions to the security of our systems through our Responsible Disclosure Program. Their dedication to identifying and responsibly reporting vulnerabilities has been instrumental in safeguarding our users’ data and ensuring the integrity of our platforms.

Hall of Fame:

ResearcherPortfolioNo. VA
Salman Khan(Sprotechs)1
Hasir Hamdan(Linkedin)1
D.Sanjai Kumar(Linkedin)1
Rivek Raj Tamang(Linkedin)1
Waseeq shah(Instagram)1
Muhammad Abdullah(Linkedin)2
Butirandebu(Linkedin)1
Analytics are updated after the fix
VA (Vulnerabilities Accepted)