Responsible Disclosure
Coordinated Vulnerability Disclosure (CVD)
Coordinated Vulnerability Disclosure (CVD)
If you notice a vulnerability in one of our systems, we kindly ask you to contact us. We appreciate the careful reporting of such vulnerabilities according to the conditions below and are happy to cooperate so that we can take action as soon as possible.
Conditions | Process |
| We ask you to adhere to the following conditions: | Further processing takes place as follows: |
|
|
| If you have complied with the above conditions, we will not take any legal action against you regarding the report. |
When investigating a vulnerability in one of our systems, please take into account the proportionality of the attack. You don’t have to prove that if you carry out a large (D)DoS attack on 1 of our services, we will be down for a while. We know that.
So this is not an invitation to actively scan our networks to discover weak spots. Brute force attacks, (D)DoS and social engineering fall outside the scope of this Responsible Disclosure policy.
Do not perform (D)DoS attacks.
Secondly; do not test rate-limits on forms. The disruption these ’tests’ cause are worse than any possible discovery of rate-limit vulnerabilities.
Reports that are based on the following findings or scenarios are excluded from this responsible disclosure policy:
Do not submit reports of these excluded findings. These are probably known & accepted risks or previously reported.
As a thank you for your help, we offer a reward for reporting an as yet unknown security issue that fully conforms to this policy. We determine the size of the reward based on the severity and quality of the report.
If it concerns a previously reported, low or accepted risk vulnerability, the report does not qualify for a reward.
We will not reward when you are living in a country listed on an EU or UN sanction lists.
This responsible disclosure policy is based on responsibledisclosure.nl and the NCSC’s CVD policy guideline.