
flood.io
External Program
Submit bugs directly to this organization
Flood IO aims to keep its Service safe for everyone, and data security is of utmost priority. If you are a security researcher and have discovered a security vulnerability in the Service, we appreciate your help in disclosing it to us in a responsible manner.
Flood IO will engage with security researchers when vulnerabilities are reported to us in accordance with this Responsible Disclosure Policy. We will validate, respond and fix vulnerabilities in accordance with our commitment to security and privacy. We won’t take legal action against or suspend or terminate access to the Service of those who discover and report security vulnerabilities in accordance with this Responsible Disclosure Policy. Flood IO reserves all of its legal rights in the event of any noncompliance.
Capitalized terms used in this Responsible Disclosure Policy and not otherwise defined have the meaning ascribed to such terms in our Terms of Service.
You may test only against an Account for which you are the Account owner to conduct such testing. In no event are you permitted to access, download or modify data residing in any other Account or that does not belong to you or attempt to do any of the foregoing. You are also prohibited from:
Share the details of any suspected vulnerabilities with the Flood IO Security Team by sending an email to [email protected]. Please do not publicly disclose these details without express written consent from Flood IO. In reporting any suspected vulnerabilities, please include the following information:
Requests for monetary compensation in connection with any identified or alleged vulnerability will be deemed noncompliant with this Responsible Disclosure Policy.
If you identify a verified security vulnerability in compliance with this Responsible Disclosure Policy, Flood IO commits to:
Bugs in third party applications or systems, denial of service vulnerabilities, social engineering techniques, or bugs that require physical access to the targeted victim's device are not considered.