You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/internals/bug-bounty.mdx
+20
Original file line number
Diff line number
Diff line change
@@ -58,3 +58,23 @@ We ask that researchers:
58
58
- Give us a reasonable window to investigate and patch before going public
59
59
60
60
Researchers can also spin up our [self-hosted version of Infisical](/self-hosting/overview) to test for vulnerabilities locally.
61
+
62
+
### Program Conduct and Enforcement
63
+
64
+
We value professional and collaborative interaction with security researchers. To maintain the integrity of our bug bounty program, we expect all participants to adhere to the following guidelines:
65
+
66
+
- Maintain professional communication in all interactions
67
+
- Do not threaten public disclosure of vulnerabilities before we've had reasonable time to investigate and address the issue
68
+
- Do not attempt to extort or coerce compensation through threats
69
+
- Follow the responsible disclosure process outlined in this document
70
+
- Do not use automated scanning tools without prior permission
71
+
72
+
Violations of these guidelines may result in:
73
+
74
+
1.**Warning**: For minor violations, we may issue a warning explaining the violation and requesting compliance with program guidelines.
75
+
2.**Temporary Ban**: Repeated minor violations or more serious violations may result in a temporary suspension from the program.
76
+
3.**Permanent Ban**: Severe violations such as threats, extortion attempts, or unauthorized public disclosure will result in permanent removal from the Infisical Bug Bounty Program.
77
+
78
+
We reserve the right to reject reports, withhold bounties, and remove participants from the program at our discretion for conduct that undermines the collaborative spirit of security research.
79
+
80
+
Infisical is committed to working respectfully with security researchers who follow these guidelines, and we strive to recognize and reward valuable contributions that help protect our platform and users.
0 commit comments