Vulnerability Disclosure Policy
Updated: June 26th, 2020
At KnowledgeOwl, we take the security and integrity of our customer’s data seriously. As such, we welcome input from security researchers to ensure that, should any vulnerabilities in KnowledgeOwl arise, that they can be addressed quickly and effectively. However, to ensure that our customers are not impacted during any vulnerability discovery activities, please follow the terms below before testing for any vulnerabilities.
KnowledgeOwl pledges to not initiate any legal action against researchers that follow the terms below.
We do not offer any monetary rewards (e.g. bounties) for vulnerabilities reported to us.
Please restrict any testing to the following sites:
Testing KnowledgeOwl customer sites is not allowed.
Creating 1 (one) trial account per researcher is allowed. Should a researcher require a second account, or should the trial period expire before testing is complete, please contact us.
Generally, please do not perform any activities that will negatively impact users or normal functionality of KnowledgeOwl. Additionally, the following actions are specifically restricted:
Modification of data owned by other users
Deletion or corruption of data owned by other users
Denial of service attacks
Social engineering attacks including phishing
Email bombing or similar high-volume attacks
Mass submissions to or scanning of our contact us or support forms
Creating large amounts of trial accounts
Please do not violate any laws or agreements in order to locate vulnerabilities.
Reporting a Vulnerability
Please report any details of the discovered vulnerability to the following email address: firstname.lastname@example.org
The more details that the researcher is able to provide, the faster we will be able to respond to any vulnerabilities.
Vulnerability Acceptance and Remediation
KnowledgeOwl will make an effort to address every vulnerability report that is submitted to us. Following submission, we will attempt to reproduce the finding to ensure that it is valid and impactful and not a duplicate or previously accepted risk. Should the vulnerability be valid and require remediation, KnowledgeOwl will internally discuss what actions need to be taken and how the vulnerability will be remediated. We will endeavor to keep in contact with the security researcher during this process and provide updates on projected remediation timeline and will inform the researcher of vulnerability remediation. If the researcher wishes to disclose the discovered vulnerability publicly, we ask that they talk to us first, before disclosing the issue publicly.
In addition to the conditions listed above, we are not currently accepting reports in the following categories:
- Email Spoofing
- Missing Security Headers (such as the HSTS header), unless the lack of such a header directly leads to a vulnerability
- Sessions not expiring on security events, such as password changes
- Vulnerabilities that require odd or unlikely user interaction
- Logout Cross-Site Request Forgery
- Missing Rate Limiting
- Weak Password Policy
- EXIF Data Not Stripped on Images
- Host header injection, unless an exploit is demonstrated (such as cache-poisoning or XSS)
We do not offer monetary bounties for accepted vulnerabilities. Researchers that report vulnerabilities to us may be eligible for addition to our hall of fame.
If you have any questions about our vulnerability disclosure policies or process, please feel free to email us at email@example.com
KnowledgeOwl would like to thank the following security researchers for their contributions of vulnerability reports and ensuring that KnowledgeOwl can continue to protect the data of its users.