Skip to content

Commit 5fdd8d5

Browse files
authored
docs: update security policy with private bug bounty program infos (#856)
1 parent 3a1b915 commit 5fdd8d5

File tree

1 file changed

+98
-32
lines changed

1 file changed

+98
-32
lines changed

docs/ecosystem/security.md

Lines changed: 98 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -3,48 +3,114 @@ id: security
33
title: Security Policy
44
---
55

6-
:::caution Disclaimer
6+
:::info Private Bug Bounty Program
77

8-
We're in the process of setting up a disclosure platform. Until that process is done, we can't payout bug bounties due to the
9-
administrative overhead. All disclosures that are made until the launch, will later be processed under the same conditions, but we
10-
can't guarantee when that happens.
8+
Ory is working with Hackerone to provide a private bug bounty program for all Ory products. If you are interested in joining the program, please [create an account at Hackerone](https://hackerone.com/sign_up) and [request access](https://hackerone.com/ory_corp). The following is the policy for the private bug bounty program.
119

1210
:::
1311

14-
As a security focused company, Ory appreciates and encourages any interest by security researches and white-hat hackers in the
15-
companies products. To support the global infosec community, we award the responsible disclosure of vulnerabilities and data leaks
16-
according to the following policies.
12+
Being a security-focused company, Ory appreciates, encourages, and rewards
13+
feedback from the security community. Ory is open source at heart, so feel free
14+
to inspect our [source code](https://github.com/ory). Ory commits to following
15+
HackerOne's
16+
[vulnerability disclosure guidelines](https://www.hackerone.com/disclosure-guidelines)
17+
and we ask you to do the same. Thank you for helping keep Ory and our users
18+
safe!
1719

18-
## Responsible Disclosure
20+
## Research guidelines
1921

20-
A responsible disclosure always starts with contacting the Ory security team, using one of the channels specified at
21-
[https://www.ory.sh/.well-known/security.txt](https://www.ory.sh/.well-known/security.txt). Provide all details to reproduce the
22-
issue in form of a non-public git repository including all setup and execution steps, the binary and source of the exploit, as
23-
well as an example exploit payload (if applicable). Low-quality reports may be disqualified. The Ory security team will contact
24-
you within 96 hours to confirm the issue or ask for further details. Don't publish or share any details regarding the issue until
25-
the Ory security team explicitly permits the publication in written form. The Ory security team will permit publication once
26-
incidence response and patches are fully enrolled. Any exploits shall not be tested against environments hosted by Ory or any
27-
third party without the explicit consent to do so. In case this happens, the submission is disqualified.
22+
While security-testing Ory systems, please make a good-faith effort to avoid
23+
privacy violations, destruction of data, and interruption or degradation of our
24+
service. Interact only with accounts you own or with the explicit permission of
25+
the account holder.
2826

29-
## Awards
27+
Prohibited activities:
3028

31-
The Ory maintainers have final decision on which issues constitute security vulnerabilities. Reports for already known issues will
32-
only be awarded with regards to the new information they add to the issue. Ory will score the severity of the disclosed issue
33-
according to [CVSS 3.1](https://www.first.org/cvss/v3.1/specification-document). Ory reserves the right to solely determine the
34-
factors affecting the score calculation based on the submitted exploit. Effectively this means that you have to prove for example
35-
the loss of confidentiality to have that included in the CVSS calculation.
29+
- social engineering like phishing, vishing, or smishing
30+
- security scanning with more than 5 QPS against Ory domains
31+
- any activity that leads to disruption of our service longer than 5 minutes
3632

37-
Other Ory open source projects may still be eligible depending on the impact of the disclosed issue.
33+
## What can you report
3834

39-
### Additional Expenses
35+
Please report any potential security vulnerability that potentially leads to
36+
sensible exploits. Please report vulnerabilities in Ory's upstream dependencies
37+
to the respective projects and only reach out to us if the the report to
38+
upstream was unsuccessful.
4039

41-
In case you required exceptional expenses for providing and disclosing the issue, Ory will refund you these expenses, if and only
42-
if you provide the original invoice and a valid reason for requiring the resources. All resources have to be directly tied to the
43-
disclosure of the issue. This clause also applies to exceptionally huge time-investment from your side. In that case, file an
44-
invoice yourself according to your local law, including a description of the work done on your side. It's Ory’s final decision
45-
whether the reasons for additional expenses are valid and the additional expenses are refunded.
40+
When reporting vulnerabilities, please consider the attack scenario,
41+
exploitability, and security impact of the bug. Out of scope are attacks
4642

47-
## Disclaimer
43+
- through the runtime environment of self-hosted Ory installations
44+
- through user-provided configuration like a user not setting appropriate
45+
permissions on projects containing sensitive information
46+
- through port address translation for Ory Cloud Projects
47+
- around missing rate limiting (we have it on our roadmap)
48+
- on intentionally public hosts and information on them like our
49+
[documentation](https://github.com/ory/docs/) and
50+
[website](https://github.com/ory/docs/)
51+
- that require physical access to the victim's computer
52+
- against vulnerabilities in outdated browsers (more than two versions behind
53+
the latest stable version)
54+
- based on software version disclosure, banner identification issues,
55+
descriptive error messages or headers (stack traces, application or server
56+
errors)
57+
- based on tabnabbing or open redirect unless you can demonstrate an additional
58+
security impact
59+
- that require unlikely user interaction
60+
- disclosing configuration and paths unless you include proof of credential
61+
leakage or demonstrate an attack with the leaked information (since we manage
62+
much of our infrastructure through public GitOps repositories)
4863

49-
This document is **not legally binding**. It’s sole purpose is to define the submission and follow-up process of reporting
50-
security issues to Ory. The content of this document may change at any time.
64+
Please use Ory's customer support channels if you need help tuning Ory
65+
components for security or need help applying security-related updates.
66+
67+
## How to report
68+
69+
Submit one vulnerability per report unless you need to chain vulnerabilities to
70+
achieve impact.
71+
72+
Please provide a detailed vulnerability report with step-by-step instructions to
73+
reproduce the issue. Only vulnerabilities that we can reproduce are eligible for
74+
a reward.
75+
76+
## Review
77+
78+
Ory commits to these response timelines:
79+
80+
- 1-2 business days to first response
81+
- 3-5 business days from report submission to triage
82+
- 3-5 business days from triage to bounty
83+
84+
We'll stay in close contact with you throughout the process.
85+
86+
## Rewards
87+
88+
While all reward decision are up to our discretion, we generally award these
89+
monetary bounties out of our total yearly bounty budget for security
90+
vulnerabilities that we can reproduce:
91+
92+
| Low | Medium | High | Critical |
93+
| ---- | ------ | ------ | -------- |
94+
| $100 | $350 | $1,000 | $3,000 |
95+
96+
We also award swag for smaller findings like problems with Ory usage of
97+
third-party software and services for marketing, email, or developer support.
98+
99+
When receiving multiple reports about the same issue, we award the first report
100+
that we can fully reproduce. Multiple vulnerabilities caused by the same
101+
underlying issue result in only one bounty. We award public Zero-day
102+
vulnerabilities that have had an official patch for less than one month on a
103+
case-by-case basis
104+
105+
## Publication
106+
107+
Please do not discuss any vulnerabilities, even resolved ones, outside this
108+
program without written consent from Ory.
109+
110+
## Safe Harbor
111+
112+
Any activities conducted in a manner consistent with this policy will be
113+
considered authorized conduct and not result in legal action from Ory against
114+
you. If you face legal action in connection with activities conducted under this
115+
policy, Ory will take steps to make it known that you conducted your actions in
116+
compliance with this policy.

0 commit comments

Comments
 (0)