Security Exploit Bounty Program

Security Exploit Bounty Program

In order to be eligible for a bounty, your submission must be accepted as valid by LockDown. We use the following guidelines to determine the validity of requests and the reward compensation offered.

 

I. Requirements
a) Responsible Disclosure

Security is of utmost importance to LockDown. In pursuit of the best possible security for our service, we welcome responsible disclosure of any vulnerability you find in LockDown. Principles of responsible disclosure include, but are not limited to:

  • Accessing or exposing only data that is your own.
  • Avoiding scanning techniques that are likely to cause degradation of service to others users (e.g. by overloading the site or apps).
  • Keeping details of vulnerabilities secret until LockDown has been notified and had a reasonable amount of time to fix the vulnerability.
  • Keeping within the guidelines of our Terms Of Service.*

* In the event that you take any of the actions outlined in “Acceptable Use of Services” of the LockDown Terms of Service and act in a way that violates any of the principles of responsible disclosure set forth above or otherwise shows malicious intent as determined by LockDown, such actions will be deemed a breach of LockDown’s Bug Bounty Program and Terms of Service, and LockDown may pursue any remedies available to it under applicable law.

b) Reproducibility

Our engineers must be able to reproduce the security flaw from your report. Reports that are too vague or unclear are not eligible for a reward. Reports that include clearly written explanations and working code are more likely to garner rewards.

 

II. Severity

In order to be eligible for a bounty, your submission must be accepted as valid by LockDown. We use the following guidelines to determine the validity of requests and the reward compensation offered.

More severe bugs will be met with greater rewards. We are most interested in vulnerabilities with LockDown for iPhone, LockDown for Android, LockDown for MacOS, LockDown for Windows and getlockdown.com. Other subdomains of LockDown are generally not eligible for rewards unless the reported vulnerability somehow affects LockDown apps or LockDown business customer data.

Examples of Qualifying Vulnerabilities
  • Authentication flaws
  • Circumvention of our Platform/Privacy permissions model
  • Clickjacking
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF/XSRF)
  • Mixed-content scripts on app.asana.com
  • Server-side code execution
Examples of Non-Qualifying Vulnerabilities
  • Denial of Service vulnerabilities (DOS)
  • Possibilities to send malicious links to people you know
  • Insecure cookies on getlockdown.com
  • Social engineering attacks against LockDown Support
  • Vulnerabilities that require a potential victim to install non-standard software or otherwise take active steps to make themselves be susceptible

 

III. Rewards
  • Only 1 bounty will be awarded per vulnerability.
  • If we receive multiple reports for the same vulnerability, only the person offering the first clear report will receive a reward.
  • We maintain flexibility with our reward system, and have no minimum/maximum amount; rewards are based on severity, impact, and report quality.
  • To receive a reward, you must reside in a country not on sanctions lists (e.g., Cuba, Iran, North Korea, Sudan & Syria). This is a discretionary program and LockDown reserves the right to cancel the program; the decision whether or not to pay a reward is at our discretion.

 

IV. Contact

Please email us at [email protected] with any vulnerability reports or questions about the program.