forked from DefectDojo/django-DefectDojo
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
17ec283
commit f5d6cc6
Showing
6 changed files
with
35 additions
and
337 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,20 +1,24 @@ | ||
# Security | ||
|
||
No technology is perfect, and OWASP DefectDojo believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product, we encourage you to notify us. We welcome working with you to resolve the issue promptly. | ||
|
||
# Disclosure Policy | ||
* Let us know by submitting the finding through HackerOne's [disclosure submission program](https://hackerone.com/defectdojo/reports/new) as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue. | ||
* Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party. | ||
* Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder. | ||
|
||
# Exclusions | ||
While researching, we'd like to ask you to refrain from: | ||
* Denial of service | ||
* Spamming | ||
* Social engineering (including phishing) of DefectDojo staff or contractors | ||
* Any physical attempts against DefectDojo property or cloud hosted environments | ||
|
||
# Safe Harbor | ||
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy. | ||
No technology is perfect, and OWASP DefectDojo believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product, we encourage you to notify us. We welcome working with you to resolve the issue promptly. | ||
|
||
## Disclosure Policy | ||
|
||
* Let us know by submitting the finding through HackerOne's [disclosure submission program](https://hackerone.com/defectdojo/reports/new) as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue. | ||
* Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party. | ||
* Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder. | ||
|
||
## Exclusions | ||
|
||
While researching, we'd like to ask you to refrain from: | ||
|
||
* Denial of service | ||
* Spamming | ||
* Social engineering (including phishing) of DefectDojo staff or contractors | ||
* Any physical attempts against DefectDojo property or cloud hosted environments | ||
|
||
## Safe Harbor | ||
|
||
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy. | ||
|
||
Thank you for helping keep DefectDojo and our users safe! |
Oops, something went wrong.