Skip to content

Commit

Permalink
docs: Update Vulnerabitliy Policy
Browse files Browse the repository at this point in the history
  • Loading branch information
rohalskyy committed Sep 19, 2024
1 parent ab55fa5 commit 7b13f42
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 191 deletions.
91 changes: 0 additions & 91 deletions src/content/docs/docs/hall-of-fame.mdx

This file was deleted.

99 changes: 1 addition & 98 deletions src/content/docs/docs/vulnerability-policy.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -5,101 +5,4 @@ slug: vulnerability-policy
template: splash
---

import { Aside, LinkButton } from '@astrojs/starlight/components';

Privately share details of the suspected vulnerability with Crowdin by sending an email to [[email protected]](mailto:[email protected]). Provide full details of the suspected vulnerability, so the Crowdin security team may validate and reproduce the issue.

<Aside type="tip" title="Join our bug bounty program on HackerOne">
Crowdin is transitioning to managing its bug bounty program through HackerOne. The program is currently private. To request an invitation, contact [[email protected]](mailto:[email protected]) and include your HackerOne handle.
</Aside>

## Hall of Fame

On behalf of our thousands of users, we thank the named researchers for helping make Crowdin safer.

<LinkButton href="/hall-of-fame/">
View hall of fame
</LinkButton>

## What are We Looking for {#looking_for}

When submitting an issue, please provide a technical description that allows us to assess exploitability and impact of the issue.

- Provide steps to reproduce the issue, including any URLs or code involved.
- If you are reporting a cross-site scripting (XSS), your exploit should at least pop up an alert in the browser.
It is much better if the XSS exploit shows user's authentication cookie.
- For a cross-site request forgery (CSRF), use a proper CSRF case when a third party causes the logged in victim to perform an action.
- For a SQL injection, we want to see the exploit extracting database data, not just producing an error message.
- HTTP request / response captures or simply packet captures are also very useful to us.
- Please refrain from sending us links to non-Crowdin web sites, or issues in PDF / DOC / EXE files.
Image files are OK. Make sure the bug is exploitable by someone other than the user (e.g., "self-XSS").

## What We are Not Looking for

- Descriptive error messages (e.g., application or server errors).
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g., robots.txt).
- Clickjacking and issues only exploitable through clickjacking.
- CSRF on forms that are available to anonymous users (e.g., the contact form).
- Logout Cross-Site Request Forgery (logout CSRF).
- Presence of application or web browser ‘autocomplete’ or ‘save password’ functionality.
- Lack of Secure and HTTPOnly cookie flags.
- Lack of Security Speedbump when leaving the site.
- Weak Captcha / Captcha Bypass.
- Username enumeration via Login Page error message.
- Username enumeration via Forgot Password error message.
- Login or Forgot Password page brute force and account lockout not enforced.
- OPTIONS / TRACE HTTP method enabled.
- SSL Attacks such as BEAST, BREACH, Renegotiation attack.
- SSL Forward secrecy not enabled.
- SSL Insecure cipher suites.
- The Anti-MIME-Sniffing header X-Content-Type-Options.
- Missing HTTP security headers, specifically.

## Vulnerability Reporting Agreement

Please review these terms before you test and/or report a vulnerability. Crowdin pledges not to initiate legal action against researchers for penetrating or attempting to penetrate our systems as long as they adhere to this policy.

### Crowdin does not permit the following types of security research

While we encourage you to discover and report to us any vulnerabilities you find in a responsible manner, the following conduct is expressly prohibited:

- Performing actions that may negatively affect Crowdin or its users.
- Accessing, or attempting to access, data or information that does not belong to you.
- Destroying or corrupting, or attempting to destroy or corrupt, data or information that does not belong to you.
- Conducting any kind of physical or electronic attack on Crowdin personnel, property or data centers.
- Social engineering any Crowdin service desk, employee or contractor.
- Conduct vulnerability testing of participating services using anything other than test accounts.
- Violating any laws or breaching any agreements in order to discover vulnerabilities.

### The Crowdin security team commitment

We ask that you do not share or publicize an unresolved vulnerability with/to third parties. If you responsibly submit a vulnerability report, the Crowdin security team and associated development organizations will use reasonable efforts to:

- Respond in a timely manner, acknowledging receipt of your vulnerability report.
- Provide an estimated time frame for addressing the vulnerability report.
- Notify you when the vulnerability has been fixed.
- We are happy to thank every individual researcher who submits a vulnerability report helping us improve our overall security posture at Crowdin.

Please note that by submitting us a vulnerability report, you grant us a perpetual, worldwide, royalty-free, irrevocable and non-exclusive license and right, to use, modify, and incorporate your submission or any parts thereof into our products, services, or test systems without any further obligations or notices to you.

We would be thankful for any further relevant technical information that you may have, especially if reproduction is tricky. If we cannot reproduce it, we cannot reward you.
However, there is no need to describe the security impact of your finding - we understand security risks and we can figure that out. We only need technical details.

## Rewards

We maintain flexibility with our reward system; rewards are based on severity, impact, and report quality.
For example, we can provide you with a coupon to get Crowdin Swag. Depending on what you discover, you may go onto the Crowdin [Hall of Fame](/hall-of-fame/).
If you would rather stay behind an alias (handle) or anonymous, we will of course respect that.

We do have specific things we are (and are not) looking for - so check [What are we looking for](#looking_for).

If you report several issues that are duplicates in different parts of the service (e.g., the same code running on different nodes or platforms), or part of a larger issue, these may be combined into one and only one reward may be possible.

If someone else has already reported the finding earlier, we will let you know after the issue has been fixed. If several researchers report the same issue, we only reward the sender of the first report that provides us with enough technical details to reproduce the finding.
We know that this would give us a loophole to claim that everything's been already previously found, but trust us, we want to be fair.

A reward will not be provided if the finding becomes known by anyone else than you or us, in any way, before it is fixed.

You can always keep tracking of how your issue is progressing. [Contact Crowdin Security](https://crowdin.com/contacts) team for this.
Crowdin is transitioning to managing its bug bounty program through HackerOne. The program is currently private. To request an invitation, contact [[email protected]](mailto:[email protected]) and provide your HackerOne handle. Details about the vulnerabilities we're looking for, exclusions, and program conditions are available directly on HackerOne.
1 change: 0 additions & 1 deletion src/content/docs/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,6 @@ import { Icon } from 'astro-icon/components';
<li>[GDPR Commitment](/gdpr/)</li>
<li>[HIPAA Disclaimer](/hipaa-disclaimer/)</li>
<li>[Media Kit](/using-logo/)</li>
<li>[Hall of Fame](/hall-of-fame/)</li>
<li>[Intellectual Property Rights](/intellectual-rights-for-translations/)</li>
</ul>
</div>
Expand Down
4 changes: 3 additions & 1 deletion vercel.json
Original file line number Diff line number Diff line change
Expand Up @@ -261,6 +261,8 @@
{ "source": "/enterprise/google-play/", "destination": "/enterprise/google-play-integration/", "permanent": true },

{ "source": "/developer/api-clients/", "destination": "/developer/api/#api-clients", "permanent": true },
{ "source": "/developer/creating-oauth-app/", "destination": "/developer/authorizing-oauth-apps/", "permanent": true }
{ "source": "/developer/creating-oauth-app/", "destination": "/developer/authorizing-oauth-apps/", "permanent": true },

{ "source": "/hall-of-fame/", "destination": "/vulnerability-policy/", "permanent": true }
]
}

0 comments on commit 7b13f42

Please sign in to comment.