Version: 1.0

Date Effective: 2019-05-19

I welcome and value vulnerability disclosures from responsible security researchers, and I recognize the importance of the work done by the security community. I have developed this policy to encourage and support responsible disclosure and the crucial work done by ethical hackers.

Scope

The following are in-scope:

  • My personal website at https://u8nwxd.github.io
  • Any of projects under my GitHub account. Note that only repositories owned by that account (U8NWXD) are in-scope. The fact that I contribute to a repository does not make it in-scope for this policy. Vulnerabilities discovered in those projects should be reported to the project owners.

Everything not listed as in-scope above is out-of-scope and not covered under this policy. Note that for the sake of clarity, the following are explicitly out-of-scope:

  • Any physical exploits or research that involves physical access to my person or property.
  • Any research involving physical tresspass.
  • Any social engineering attack. Do not send any phishing emails, for example.

Requirements

Note that except for requirements that are explicitly restricted to intentional acts, both intentional and accidental violations of these requirements will constitute a violation of this policy.

  • You may not disclose any vulnerabilities without my explicit written permission. Note that “disclosure” here includes both public and private disclosure.
  • You may not disrupt any services nor impair others’ ability to use any services.
  • You may not modify or delete any data that I host, with the exception that you may do so temporarily only to demonstrate the vulnerability.
  • Neither this policy nor your ability to access data constitutes authorization for you to access that data. If you discover a vulnerability that provides access to data that I did not intend to be accessible to you, you may not access the data except to the extent that is strictly necessary to demonstrate the presence of a vulnerability.
  • If you encounter any data that must be protected by law (e.g. protected health information), you must not access the data and report the vulnerability immediately.
  • You must disclose to me, via the process described in this policy, any vulnerabilities you discover.
  • As much as possible, you must interact only with accounts you own or with accounts whose owners have given you explicit, informed permission for your activities.
  • You must not at any time, not even when disclosing the vulnerability or after disclosure, release any data you encounter that I did not intend to be accessible. Note that “release” here includes both public and private release.
  • You must comply with all applicable laws, including those of the United States of America. See the rest of this policy for safe harbor provisions.
  • You must never threaten or infringe upon anyone’s rights, safety, property, or person.
  • You must only work on those systems or programs listed as in-scope by this policy.

Safe Harbor

I consider research conducted in accordance with this policy to be:

  • Conducted in good faith;
  • Authorized for the purposes of the Computer Fraud and Abuse Act (CFAA) and any any similar state laws;
  • Exempt from the Digital Millenium Copyright Act (DMCA); and
  • Lawful to the extent that the research was necessary to discover and report the vulnerability.

I will not pursue legal action against anyone based on activities that are authorized by and compliant with this policy. However, note that these safe-harbor provisions only apply to me. If in the course of your research you illegally access a third party’s system, for example, that third party may still take legal action against you, and I might not defend you.

Note that the above safe harbor provisions only apply to cyber-security research conducted in compliance with this policy.

Submission Details

These details are non-binding and are only intended to give you an idea of how I respond to vulnerability disclosures.

  • Contact me using encrypted email to report the vulnerability. Details and my public key are available from my security page. Using an insecure communication method to transmit details of a vulnerability may constitute an unauthorized disclosure. Please include a description of the vulnerability and detailed steps to reproduce it. Reports should be clearly written in English.
  • I will review your disclosure and respond within 10 business days.
  • I may ask you for more details to help me remediate the vulnerability.
  • I will remediate the vulnerability.
  • I will most likely authorize you to publicly disclose the vulnerability, disclose it myself, and publicly credit you with the disclosure (if you so choose). I do not forsee a situation in which I would prevent disclosure entirely, but such a situation may arise.

Note that I do not offer bug bounties, but I am happy to credit you for your work!

Acknowledgements

This policy was inspired by the following resources: