Responsible Disclosure Policy

Zivy prioritizes system and data security. We strive to maintain a safe environment. If you find security vulnerabilities, please disclose them responsibly.

Introduction

Zivy takes the security of our systems and its data very seriously. We are continuously striving to maintain and ensure that our environment is safe and secure for everyone to use. If you've discovered any security vulnerabilities associated with any of our Zivy services, we do appreciate your help in disclosing it to us in a responsible manner.

Zivy will engage with you as external security researchers (the Researcher) when vulnerabilities are reported to us in accordance with this Responsible Disclosure Policy.

If a Researcher follows the rules set out in this Responsible Disclosure Policy when reporting a security vulnerability to us, unless prescribed otherwise by law or the payment scheme rules, we commit to:

In Scope of this Policy

Any of the Zivy services' APIs, web apps, mobile apps, which process, store, transfer or use in one way or personal or sensitive personal information, such as PII data and authentication data.

Domains

Focus Areas

Automated tools or scripts ARE STRICTLY PROHIBITED, and any POC submitted to us should have a proper step-by-step guide to reproduce the issue. Abuse of any vulnerability found shall be liable for legal penalties.

Out of Scope

General

System and Infrastructure Related

  1. Patches released within the last 30 days
  2. Networking issues or industry standards
  3. Password complexity
  4. Email related:
    • SPF or DMARC records
    • Gmail "+" and "." acceptance
    • Email bombs
    • Unsubscribing from marketing emails
  5. Information Leakage:
    • HTTP 404 codes/pages or other HTTP non-200 codes/pages
    • Fingerprinting / banner disclosure on common/public services
    • Disclosure of known public files or directories, (e.g. robots.txt)
  6. Cacheable SSL pages

Authentication Related

  1. Forgot Password page bruteforce and account lockout not enforced
  2. Lack of Captcha
  3. Presence of application or web browser 'autocomplete' or 'save password' functionality
  4. Session Timeouts

Testing

A Researcher can test only against their own account if they are an account owner or an agent authorised by the account owner to conduct such testing.

As a Researcher, in no event are you permitted to access, download or modify data residing in any other account or that does not belong to you or attempt to do any such activities.

In the interest of the safety of our users, employees, the Internet at large and you as a Researcher, the following test types are expressly excluded from scope and testing: any findings from physical testing (office access, tailgating, open doors) or DOS or DDOS vulnerabilities. A responsible disclosure also does not include identifying any spelling mistakes, or any UI and UX bugs.

Rules

We require that all Researchers must:

A header that includes a random uuid:

X-Responsible-Disclosure: RDP-<random_uuid>

Remember that you must never attempt non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.

Report Requirements

Please include the following information with your report:

Report Template

The identified bug shall have to be reported to our security team by sending us a mail from their registered email address to security@zivy.app (SUBJECT: SUSPECTED VULNERABILITY ON ZIVY) (without changing the subject line else the mail shall be ignored). The mail should strictly follow the format below:

Individual Details:

We currently do not offer any monetary compensation. However, we may send out Zivy swag in some cases.

Requests or demands for monetary compensation in connection with any identified or alleged vulnerability are non-compliant with this Responsible Disclosure Policy.

Consequences of Complying with This Policy

We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy. We consider activities conducted consistent with this policy to constitute "authorised" conduct under the Computer Fraud and Abuse Act. We will not bring a DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope.

If legal action is initiated by a third party against you and you have complied with Zivy's Vulnerability Disclosure Program, Zivy will take steps to make it known that your actions were conducted in compliance with this policy.

Public Disclosure Policy

By default, this program is in "PUBLIC NONDISCLOSURE" mode which means:

"THIS PROGRAM DOES NOT ALLOW PUBLIC DISCLOSURE. ONE SHOULD NOT RELEASE THE INFORMATION ABOUT VULNERABILITIES FOUND IN THIS PROGRAM TO PUBLIC, FAILING WHICH SHALL BE LIABLE FOR LEGAL PENALTIES!"

The Fine Print

We may modify the terms of this program or terminate this program at any time. We won't apply any changes we make to these program terms retroactively.

Contact us at security@zivy.app for more details.