Committed to Security Coordination
General Motors (“GM”) takes security and privacy very seriously. If you have information related to security vulnerabilities of GM products or services, we want to hear from you. Please submit a report in accordance with the guidelines below.
We value the positive impact of your work and thank you in advance for your contribution.
Your participation in GM’s Vulnerability Disclosure Program (“VDP”) is voluntary. Before finding and reporting any potential security findings you are required to read and agree to the VDP’s eligibility requirements and participation guidelines.
Participant Eligibility
- GM customers and security researchers who discover a potential security finding within GM’s products or services are eligible to participate in the VDP;
- GM employees and contractors, as well as their immediate family members are strictly prohibited from participating in the VDP or sharing information with an external security researcher to bypass this prohibition (in which case all parties are ineligible under the VDP);
- Participants must be 18 years or older; and
- Participants must not be a resident of or make Submissions from a country which the United States has issued export sanctions or other trade restrictions.
If (i) you do not meet the eligibility requirements above; (ii) you breach any of these guidelines described below; or (iii) we determine that your participation in the VDP could adversely impact us, our affiliates or any of our users, employees, or agents, we, in our sole discretion, may remove you from the VDP and disqualify you from receiving any benefit of the VDP.
Participation Guidelines
Participants must adhere to the following guidelines:
- Participants’ research methods must not cause harm to GM, our customers, or others;
- Participants must provide a detailed summary of the vulnerability, including the target, steps, tools, and artifacts used during discovery (the detailed summary will allow us to reproduce the vulnerability). Reports with complete vulnerability details, including screenshots or video, are essential for a quick response;
- Participants and their research methods must not compromise the privacy or safety of our customers and the operation of our services. Specifically, participants must;
- contact us immediately through the HackerOne platform if you inadvertently encounter user data or believe you have impacted the safe operation of any vehicles. You may also reach out to GM at www.awareline.com;
- not view, alter, save, store, transfer, or otherwise access the data, and immediately purge any local information upon reporting the vulnerability to GM;
- act in good faith to avoid privacy violations, destruction of data, interruption or degradation of our services (including denial of service), and any impact to the operation of GM products or services;
- In the event Participants suspect their research has impacted vehicle data or the safe operation of their vehicle, Participants should stop operating their vehicle and contact their dealer;
- Participants must comply with all applicable laws;
- Participants must not violate any other law (other than those that would result only in claims by GM), or disrupt or compromise any data or vehicle that is not their own;
- Participants must not publicly disclose vulnerability details until after GM confirms completed remediation of the vulnerability. Moreover, Participants must not publicly disclose vulnerability details if there is no remediation completion date or the completion cannot be ascertained;
- Participants must not conduct post-disclosure exploitation;
- Participants must confirm that they are not currently located in or otherwise ordinarily resident in Cuba, Iran, North Korea, Sudan, Syria or Crimea; and
- Participants must confirm that they are not on the U.S. Department of the Treasury’s Specially Designated Nationals List.
Additionally, GM agrees not to pursue civil claims against researchers related to the disclosures submitted through this website who comply with the above guidelines.
We will notify you of remediation and may reach out for questions or clarification. You must be available to provide additional information if needed by us to reproduce and investigate the report.
Testing Requirements
To ensure responsible and trackable testing activity, all researchers must follow these guidelines:
Replace [your_h1_username] with your actual HackerOne username.
- Custom Headers and Identification:
All HTTP/HTTPS traffic must include the following:
X-HackerOne-Research: [your_h1_username]
- Email Usage:
Use your HackerOne email alias when signing up or interacting with our applications
[your_h1_username]@wearehackerone.com
- IP Address Disclosure:
Please include your IP address in your report or communication to assist with log correlation and validation.
###Out of Scope
- Reports from commonly used or well-known automated tools or scans
- Issues without clearly identified security impact (such as clickjacking on a static website), missing security headers, or descriptive error messages
- Missing best practices, information disclosures, use of a known-vulnerable libraries or descriptive / verbose / unique error pages (without substantive information indicating exploitability)
- Speculative reports about theoretical damage without concrete evidence or some substantive information indicating exploitability
- Forms missing CSRF tokens without evidence of the actual CSRF vulnerability
- Self-exploitation (e.g., cookie reuse)
- Reports of insecure SSL / TLS ciphers (unless you have a working proof of concept, and not just a report from a scanner such as SSL Labs)
- Our policies on presence / absence of SPF / DMARC records
- Password complexity requirements, account / e-mail enumeration, or any report that discusses how you can learn whether a given username or email address has a GM-related account
- Missing security-related HTTP headers which do not lead directly to a vulnerability
- Self Cross-site Scripting vulnerabilities without evidence on how the vulnerability can be used to attack another user
- POST-based Reflected Cross-site Scripting (XSS) vulnerabilities (Unless supporting documentation can be provided, illustrating how the vulnerability can be leveraged to exploit another entity directly from a GM trusted domain.)
- Social engineering of GM employees or contractors
- Any physical attempt against GM property or data centers
- Presence of autocomplete attribute on web forms
- Missing secure cookie flags on non-sensitive cookies
- Denial of Service Attacks
- Banner identification issues (e.g., identifying what web server version is used)
- Open ports which do not lead directly to a vulnerability
- Open redirect vulnerabilities
- Publicly accessible login panels
- Clickjacking
- Content spoofing / text injection
- Websites or other technology not managed by GM
- Non-GM hosted dealership websites
Safe Harbor
GM agrees not to pursue civil action against researchers who comply with General Motors’ and HackerOne’s policies regarding the VDP. We consider activities conducted consistent with the GM Policy Terms to constitute “authorized” conduct under the Computer Fraud and Abuse Act. Also, if you comply with the GM Policy Terms, we will not bring a DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope.
If legal action is initiated by a third party against you and you have complied with the GM Policy Terms, we will, if asked, state that your actions were conducted in compliance with this policy.
By clicking Submit Report, you consent to your Information being transferred to and stored in the United States and acknowledge that you have read and accepted the Terms, Privacy Policy and Disclosure Guidelines presented to you when you created your account.
Changes to Program
GM reserves the right to modify the terms and conditions of the VDP, and your participation in the VDP constitutes acceptance of all terms.
- By making a submission, you represent and warrant that the submission is original to you, and you have the right to submit the submission.
- By making a submission, you give us the right to use your submission for any purpose.
Please check this site regularly as we routinely update our program terms and eligibility, which are effective upon posting. You can subscribe to receive email notifications when this policy is updated.