At Shoreline, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present. Security is core to our values, and we value the input of hackers acting in good faith to help us maintain a high standard for security and privacy for our users. This includes encouraging responsible vulnerability research and disclosure. This policy sets out our definition of 'good faith' in the context of finding and reporting vulnerabilities, as well as what you can expect from us in return.
When working with us according to this policy, you can expect us to:
- Extend Safe Harbor for your vulnerability research that is related to this policy.
- Work with you to understand and validate your report, including timely initial response to the submission.
- Work to remediate discovered vulnerabilities in a timely manner.
- Recognise your contribution to improving our security if you are the first to report a unique vulnerability, with your report triggering a code or configuration change.
Any service on our domains app.shoreline.no, and mpa.shoreline.no, but not services that are hosted by third parties. Examples of 3rd party services may include but are not limited to, Azure, Amazon AWS, and Google Analytics. If you have any questions about scope, please contact us at firstname.lastname@example.org.
When reporting vulnerabilities, please consider (1) attack scenario/exploitability, and (2) security impact of the bug.
We do not offer money or swag as rewards at this point in time.
How to contact us
Our official communication channel is via email to email@example.com.
To encourage vulnerability research and to avoid any confusion between legitimate research and malicious attack, we ask that you attempt, in good faith, to:
- Play by the rules. This includes following this policy any other relevant agreements.
- Report any vulnerability you’ve discovered promptly.
- Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming the user experience.
- Use only the official channels to discuss vulnerability information with us.
- Do not reveal the problem to others until it has been resolved.
- Do not use attacks on physical security, social engineering, distributed denial of service, spam, or applications of third parties.
- Handle the confidentiality of details of any discovered vulnerabilities according to our Disclosure Policy.
- Perform testing only on in-scope systems, and respect systems and activities that are out-of-scope.
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service.
- If a vulnerability provides unintended access to data; limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information.
- Only interact with test accounts you own or with explicit permission from the account holder.
- Not engage in extortion.
When conducting vulnerability research according to this policy, we consider this research to be authorised, lawful, helpful to the overall security of the Internet and conducted in good faith.
You are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through one of our official channels before going any further.
What we promise
- We will respond to your report within 3 business days with our evaluation of the report and an expected resolution date.
- If you have followed the instructions above, we will not take any legal action against you in regard to the report.
- We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission.
- We will keep you informed of the progress towards resolving the problem.
- In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise).