Understanding the vulnerability disclosure policy
Who is this article for?Users who want to understand the vulnerability disclosure policy.
No elevated permissions are required.
Understanding a company's vulnerability disclosure policy is crucial for security researchers and conscientious individuals who wish to report potential security issues responsibly. This article delves into the key components of a typical vulnerability disclosure policy, explaining its importance in fostering collaboration between organisations and the cybersecurity community to enhance overall digital security.
- Security and privacy commitment
- Reporting security issues
- Responsible disclosure guidelines
- Bug bounty programme
- Further reading
1. Security and privacy commitment
At Lucidity, we prioritise security and recognise the critical importance of privacy and data integrity for our users. We are committed to responsible disclosure to our customers and vendors regarding any security vulnerabilities.
2. Reporting security issues
If you discover a potential vulnerability in a Lucidity product or need to report a security incident, please contact us at: security@luciditysoftware.com.au.
3. Responsible disclosure guidelines
- Notify Lucidity with detailed information about the vulnerability.
- Allow a reasonable time frame for us to address the issue before public disclosure.
- Provide sufficient details to reproduce the issue, including target URLs, request/response pairs, and screenshots.
- We will confirm receipt, evaluate the issue's validity, and keep you informed of our progress on valid concerns.
- Avoid privacy violations, data destruction, or service disruptions during your investigation.
- Refrain from exploiting any security issues you discover.
4. Bug bounty programme
We value and reward security researchers who help protect our users by reporting vulnerabilities. Monetary rewards are at Lucidity's discretion, based on risk, impact, and other factors. To qualify for a bounty:
- Adhere to our Responsible Disclosure Policy.
- Report a valid security issue (Lucidity determines what constitutes a potential security vulnerability).
- Ensure your report falls within the accepted scope (defined below).
- Disclose any inadvertent privacy violations or service disruptions caused during your investigation.
Bounty amounts are determined based on factors including ease of exploit, potential risk, and other relevant considerations. In case of duplicate reports, the first reporter will receive the bounty.
4.1. Bug bounty scope
Included Domains:
- *.integralcs.com
- *.luciditysoftware.com.au
Excluded Domains:
- *.ourintranet.net
- *.intranet.integralcs.com
- cruse.com.au
- luciditysoftware.com.au