Skip to content

Commit 0d2b3ad

Browse files
authored
Merge pull request #3551 from Infisical/maidul98-patch-11
Add Conduct and Enforcement to bug bounty
2 parents 1c28075 + e695203 commit 0d2b3ad

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

docs/internals/bug-bounty.mdx

+20
Original file line numberDiff line numberDiff line change
@@ -58,3 +58,23 @@ We ask that researchers:
5858
- Give us a reasonable window to investigate and patch before going public
5959

6060
Researchers can also spin up our [self-hosted version of Infisical](/self-hosting/overview) to test for vulnerabilities locally.
61+
62+
### Program Conduct and Enforcement
63+
64+
We value professional and collaborative interaction with security researchers. To maintain the integrity of our bug bounty program, we expect all participants to adhere to the following guidelines:
65+
66+
- Maintain professional communication in all interactions
67+
- Do not threaten public disclosure of vulnerabilities before we've had reasonable time to investigate and address the issue
68+
- Do not attempt to extort or coerce compensation through threats
69+
- Follow the responsible disclosure process outlined in this document
70+
- Do not use automated scanning tools without prior permission
71+
72+
Violations of these guidelines may result in:
73+
74+
1. **Warning**: For minor violations, we may issue a warning explaining the violation and requesting compliance with program guidelines.
75+
2. **Temporary Ban**: Repeated minor violations or more serious violations may result in a temporary suspension from the program.
76+
3. **Permanent Ban**: Severe violations such as threats, extortion attempts, or unauthorized public disclosure will result in permanent removal from the Infisical Bug Bounty Program.
77+
78+
We reserve the right to reject reports, withhold bounties, and remove participants from the program at our discretion for conduct that undermines the collaborative spirit of security research.
79+
80+
Infisical is committed to working respectfully with security researchers who follow these guidelines, and we strive to recognize and reward valuable contributions that help protect our platform and users.

0 commit comments

Comments
 (0)