Cloudsmith aims to keep its Service safe for everyone, and data security is of utmost priority. If you are a security researcher and have discovered a security vulnerability in the Service, we appreciate your help in disclosing it to us privately and giving us an opportunity to fix it before publishing technical details.
Cloudsmith will engage with security researchers when vulnerabilities are reported to us as described here. We will validate, respond, and fix vulnerabilities in support of our commitment to security and privacy. We won’t take legal action against, suspend, or terminate access to the Service of those who discover and report security vulnerabilities responsibly. Cloudsmith reserves all of its legal rights in the event of any noncompliance.
We are pleased to offer thanks and/or a bounty reward for vulnerability information that helps us protect our customers as thanks to the security researchers who choose to participate in our bug bounty program. This will range from the public thanks to a variable monetary amount or loot of some sort (depending on our budget and the impact).
If you identify a verified security vulnerability in compliance with this Security Disclosure Policy, you can submit this to our bug bounty programme with the following process:
- You should determine if an exploit is viable (i.e. practically possible).
- You should also check to ensure that it's not explicitly out-of-scope (see below).
- You can report the exploit to us with the relevant information (see below).
- We will acknowledge receipt of the disclosure, triage impact, and then schedule a review.
- The urgency for review will be determined based on the type and impact of the exploit.
- It may take us up to one month to triage, depending on how busy the team is (we're not huge!)
- Timeframes are typically hours for critical/high, days for medium, and (upto) weeks for low.
- Please do NOT send continual "any update?" messages; we get reminded automatically.
- We will let you know if the exploit is viable, and whether we accept it as a bug bounty (or not).
- If viable, and once fixed, we will publicly thank you on our Hall of Fame.
- You may also be issued with an award in addition to being placed in the Hall of Fame.
Unauthorised Cross-Account Access
Please note that in absolutely no event are you permitted to access, download or modify data residing in any other Account, or one that is not registered to you; unless permission is expressly provided by the Account Owner.
Monetary Award Tax
If a monetary award is provided as a bounty then you are responsible for paying any taxes associated with the reward. We are obliged by law to report any such awards to the tax authorities, so please ensure that you handle this appropriately.
The vulnerability classifications that are considered in-scope are:
- Access Control Bypass;
- API Misuse Issues;
- Authentication (Broken or Bypassed);
- Business Logic Issues;
- Cross-Site Scripting (XSS);
- Cross-Site Request Forgery (CSRF);
- Complexity Bomb;
- Decompression Bomb;
- Directory Traversal;
- Improper TLS protection;
- Open URL Redirection;
- Privilege Escalation;
- Provisioning Errors;
- Remote Code Execution (RCE);
- Sensitive/Private Data Leaks;
- Session Fixation;
- Session Management (Broken or Bypassed);
- Subdomain/Domain Takeover;
- SQL Injection.
If a vulnerability isn't explicitly listed here as either in-scope and isn't explicitly mentioned in the next section as out-of-scope then it might be applicable, but we reserve the right to determine this in communication with the security researcher.
Actions/areas that are explicitly NOT considered to be in-scope:
- Executing or attempting to execute any Denial of Service (DoS) attack; or
- Knowingly posting, transmitting, uploading, linking to, sending or storing any Malicious Software; or
- Attempting to social engineer support staff; or
- Testing in a manner that would result in the sending of unsolicited or unauthorized junk mail, spam, pyramid schemes or other forms of duplicative or unsolicited messages; or
- Testing in a manner that would degrade the operation of the Service; or
- Testing or otherwise accessing or using the Service from any jurisdiction that is a Prohibited Jurisdiction; or
- Testing third-party applications or websites or services that integrate with or link to the Service.
Vulnerabilities that are explicitly NOT considered to be in-scope:
- Clickjacking, CSRF, and content spoofing issues without demonstrable security impact.
- Publicly known vulnerable libraries without a working Proof of Concept.
- Issues relating to non-Cloudsmith products.
- Open ports scanning, banner grabbing, and software version disclosure issues.
- Issues that affect only outdated user agents or unsupported platforms.
Non-qualifying best practices that are explicitly NOT considered to be in-scope:
- Missing cookie flags on non-authentication cookies.
- Missing best practices in DNS configuration (e.g., DKIM/DMARC/SPF/TXT).
- Missing best practices in SSL/TLS configuration.
- Missing best practices in Content Security Policy (CSP) or lack of other security-related headers.
- Leakage of sensitive tokens (e.g., reset password token) to trusted third parties on a secure connection (HTTPS).
Non-qualifying business practices that are explicitly NOT considered to be in-scope:
- Institution access code enumeration or demonstrating access codes leaked in internet forums.
- Credential re-usage from public dumps.
- UUID enumeration of any kind.
- Ability to determine if a username or email has a Cloudsmith account.
- Signing up with multiple accounts to abuse referral code usage.
- Password length, complexity, and re-use requirements.
- Email verification feature.
Websites/services that are explicitly NOT considered to be in-scope:
- Help Website (https://help.cloudsmith.io) - this is hosted by https://readme.io.
- Blog Website (https://blog.cloudsmith.io) - this is hosted by https://ghost.io.
- Status Website (https://status.cloudsmith.io) - this is hosted by https://statuspage.io.
- Changelog Website (https://changelog.cloudsmith.io) - this is hosted by https://getbeamer.com.
- Amazon Web Services (https://aws.amazon.com/) - this is our infrastructure provider.
- Cloudsmith staging and development environments - only production systems are in-scope for the bug bounty programme.
- Any thirdparty widgets, such as:
- Any websites under the following domains:
- *.readme.io (incl. dash.readme.io and cloudsmith.readme.io)
In order to start the reporting process, please share the details of any suspected vulnerabilities with the Cloudsmith Security Team by sending us the details to [email protected]. Please do not publicly disclose these details outside of this process without explicit permission.
In reporting any suspected vulnerabilities, please include the following information:
- Vulnerable URL: The URL where the vulnerability occurs;
- Vulnerable Parameter: If applicable, the parameter where the vulnerability occurs;
- Vulnerability Type: The type of vulnerability;
- Steps to Reproduce: Step-by-step information on how to reproduce the issue;
- Screenshots: A demonstration of the attack to aid description; and
- Attack Scenario: An example attack scenario may help demonstrate the risk and get your issue resolved faster.
Cloudsmith reserves all rights for deciding on scope, impact and reward.
If another researcher has previously reported an exploit, only the first disclosure will be considered. However, you'll always have our appreciation, and we'll let you know if this is the case. This happens often due to the number of submissions that we get.
If we're unable to replicate the issue, regardless of the timeframe between the report and our triage, we're unable to award any bounties. We'll try our absolute best to replicate, but please know that we don't receive reports and then fix them without acknowledgement.
Finally, we do not tolerate abuse or threats to our staff, regardless of the reason. We reserve the right to terminate and block all communication with such people. Everyone should acknowledge and respect that there is a Human being on both sides of every communication.
Thank you for helping us to make the world of package management that bit safer.
Updated about a month ago