Conversation
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. |
There was a problem hiding this comment.
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| * Rewarding you when appropriate. | |
| * Never taking legal action against responsible researchers. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. |
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. | ||
|
|
There was a problem hiding this comment.
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| ## What We Expect | ||
| We ask all researchers to follow these basic rules: | ||
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: |
There was a problem hiding this comment.
| ## What We Expect | |
| We ask all researchers to follow these basic rules: | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
| * A detailed list of in-scope and out-of-scope systems | ||
| * Rules of engagement for security testing | ||
| * Submission guidelines | ||
| * Potential rewards for eligible findings |
There was a problem hiding this comment.
| * A detailed list of in-scope and out-of-scope systems | |
| * Rules of engagement for security testing | |
| * Submission guidelines | |
| * Potential rewards for eligible findings | |
| - A detailed list of in-scope and out-of-scope systems | |
| - Rules of engagement for security testing | |
| - Submission guidelines | |
| - Potential rewards for eligible findings |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. |
| * Keeping you informed about progress. | ||
| * Rewarding you when appropriate. | ||
| * Never taking legal action against responsible researchers. | ||
|
|
There was a problem hiding this comment.
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
| * A detailed list of in-scope and out-of-scope systems | ||
| * Rules of engagement for security testing | ||
| * Submission guidelines | ||
| * Potential rewards for eligible findings |
There was a problem hiding this comment.
| * A detailed list of in-scope and out-of-scope systems | |
| * Rules of engagement for security testing | |
| * Submission guidelines | |
| * Potential rewards for eligible findings | |
| - A detailed list of in-scope and out-of-scope systems | |
| - Rules of engagement for security testing | |
| - Submission guidelines | |
| - Potential rewards for eligible findings |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
| - Your name/handle and a link for recognition in our Hall of Fame. | ||
|
|
||
| If you’d like to encrypt the information, please use our [PGP-key](https://pgp.mit.edu/pks/lookup?search=0x4FDDF9236D0E2A2E&op=index&rel=noopener): (ID: 6D0E2A2E, Fingerprint: 5CF5 61BE C0AA AE11 8164 6576 4FDD F923 6D0E 2A2E). | ||
| You can find the current scope and testing guidelines directly on our Intigriti page. |
There was a problem hiding this comment.
| You can find the current scope and testing guidelines directly on our Intigriti page. | |
| You can find the current scope and testing guidelines directly on our Intigriti page. |
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | ||
| * Avoid impacting user data or privacy. | ||
| * No social engineering or physical testing. | ||
| * Keep your findings confidential until we’ve had a chance to fix the issue. | ||
|
|
||
| If you play by the rules, we commit to: | ||
| * Reviewing your report promptly. | ||
| * Keeping you informed about progress. |
There was a problem hiding this comment.
| * Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| * Avoid impacting user data or privacy. | |
| * No social engineering or physical testing. | |
| * Keep your findings confidential until we’ve had a chance to fix the issue. | |
| If you play by the rules, we commit to: | |
| * Reviewing your report promptly. | |
| * Keeping you informed about progress. | |
| - Do not exploit vulnerabilities beyond what is necessary for proof-of-concept. | |
| - Avoid impacting user data or privacy. | |
| - No social engineering or physical testing. | |
| - Keep your findings confidential until we’ve had a chance to fix the issue. | |
| - Reviewing your report promptly. | |
| - Keeping you informed about progress. | |
| - Rewarding you when appropriate. | |
| - Never taking legal action against responsible researchers. |
| * A secure and trusted platform for disclosure of vulnerabilities. | ||
| * Structured communication and feedback. | ||
| * Bounty rewards for accepted reports and easy payout. | ||
| * Optional anonymity for researchers. | ||
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | ||
| Thanks for helping us make Hypernode more secure for all our users. | ||
| We appreciate your time, your skills, and your ethical approach. |
There was a problem hiding this comment.
| * A secure and trusted platform for disclosure of vulnerabilities. | |
| * Structured communication and feedback. | |
| * Bounty rewards for accepted reports and easy payout. | |
| * Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. | |
| - A secure and trusted platform for disclosure of vulnerabilities. | |
| - Structured communication and feedback. | |
| - Bounty rewards for accepted reports and easy payout. | |
| - Optional anonymity for researchers. | |
| By centralizing our vulnerability handling with Intigriti, we ensure a smooth, fair, and secure process for everyone involved. | |
| Thanks for helping us make Hypernode more secure for all our users. | |
| We appreciate your time, your skills, and your ethical approach. |
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
| - We are aware not all our domains have complete SPF / DKIM / DMARC setups. | ||
| - We are aware our marketing domains contain social media links are missing 'noopener' attributes, and can placed in iframes. | ||
| ## What We Expect | ||
| We ask all researchers to follow these basic rules: |
There was a problem hiding this comment.
| We ask all researchers to follow these basic rules: | |
| We ask all researchers to follow these basic rules: |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
|
||
| If you believe you’ve found a security vulnerability in one of our products or platforms please send it to us by emailing disclosure@nl.team.blue. Please include the following details with your report: | ||
| ## Why Intigriti? | ||
| Using Intigriti benefits both sides: |
There was a problem hiding this comment.
| Using Intigriti benefits both sides: | |
| Using Intigriti benefits both sides: |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
docs/about-hypernode/security-policies/responsible-disclosure-policy.md
Outdated
Show resolved
Hide resolved
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
…policy.md Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
|
Acceptance server is available at https://docs-ephoo01d0.hypernode.io. |
This updates the Responsible Disclosure Policy to align with the main document