Published: February 23, 2024; Effective: February 23, 2024
Security is core to our values, and we appreciate the input of security researchers acting in good faith to help us maintain a high standard for the security and privacy of our users, which includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of good faith in the context of finding and reporting vulnerabilities and what you can expect from us in return.
Expectations
When working with us, according to this policy, you can expect us to:
Official Channels
According to this policy, any vulnerability in scope should be reported directly to this program through legal@onestepgps.com. All communications between the researcher and the program team regarding any reported vulnerability should be confined to the comments section of the corresponding report.
Severity | Description | Examples |
---|---|---|
Critical | Systemic compromise | XXE Injection and SQL Injection with significant impact. RCE and Vertical Authentication Bypass. |
High | Full access to other user's private data | IDOR, Stored XSS and CSRF with significant impact. Internal SSRF and Lateral Authentication Bypass. |
Medium | Limited access to other user's private data | IDOR, Reflective XSS and CSRF with impact. |
Low | Configuration issues and other | IDOR, Reflective XSS and CSRF with impact. |
We award vulnerability reports at our discretion. In order to be eligible for a bounty, your submission must be accepted as in-scope and valid.
The guidelines we use to determine the validity of reports are outlined below.
Reproducibility
Our engineers must be able to reproduce the vulnerability you have reported. Reports that include clearly written explanations and a working proof of concept are more likely to be awarded.
Severity and Priority
Generally, more impactful bugs will receive higher awards. Review the chart above for examples of impact levels for similar vulnerabilities.
The amount awarded may vary depending on the severity of the vulnerability reported and the quality of the report. If we receive multiple reports of the same vulnerability, the first clear, reproducible report will be awarded.
We may decide to award higher for clever or more impactful vulnerabilities, decide to award lower for vulnerabilities that require unusual user interaction, or decide that a single report constitutes multiple bugs or that multiple reports are so closely related that they only warrant a single award.
Disclosure
Researchers may only share vulnerability details with third parties after requesting and receiving explicit permission from the Program.
Guidelines
To encourage vulnerability research and to avoid any confusion between legitimate research and malicious attack, we ask that you attempt, in good faith, to:
We may modify the terms or terminate this program at any time.
In-Scope
Any design or implementation issue that substantially affects the confidentiality or integrity of user data is likely to be considered in scope. Common examples include:
While this list is reflective of the research we prioritize, it should not be considered exhaustive. Any report that concerns the possible compromise of sensitive user data or our systems is of interest. By extension, this includes reporting serious security weaknesses in any dependency—such as open-source libraries, software, or third-party components—actively used in developing our properties and/or products shared below.
Out-of-Scope
The following issues are explicitly outside the scope of this program:
The following issues are outside the scope of our program, unless they are accompanied by evidence of exploitability:
Known Issues
Any known issues will be published as a separate Known Issues list. These vulnerabilities are also considered out-of-scope, though new reports of a known issue may be accepted if the instances described were not previously observed.
Safe Harbor
When conducting vulnerability research according to this policy, we consider the research conducted under this policy to be:
You are expected, as always, to comply with all applicable laws. If a third party against you initiates legal action, and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
If you have concerns or are still determining whether your security research is consistent with this policy, please submit a report before going any further.
This is not a competition but rather an experimental and discretionary program.
You are solely responsible for any applicable taxes, transaction fees, or other withholding's that arise from or relate to your participation in this program.
Reports from individuals we are prohibited by law from paying for are ineligible for awards.