
LogSnitch
External Program
Submit bugs directly to this organization
LogSnitch looks forward to working with the security community to find vulnerabilities in order to keep our businesses and customers safe.
We ask that you:
We will not negotiate in response to duress or threats (e.g., we will not negotiate under threat of withholding the vulnerability details or threat of releasing the vulnerability or any exposed data to the public).
You are welcome to blog about any issues you’ve found, after the issues have been resolved. We appreciate any advance notice and/or blog content you can share with us prior to publication. Please do not disclose an issue prior to resolution or you will be removed from the program.
We will not pursue civil action or initiate a complaint to law enforcement for accidental, good faith violations of this policy. We consider activities conducted consistent with this policy to constitute “authorized” conduct under the Computer Fraud and Abuse Act. To the extent your activities are inconsistent with certain restrictions in our Terms of Service and Acceptable Use Policy, we waive those restrictions for the limited purpose of permitting security research under this policy. We will not bring a DMCA claim against you for circumventing the technological measures we have used to protect the applications in scope.
If legal action is initiated by a third party against you and you have complied with LogSnitch's policy, LogSnitch will take steps to make it known that your actions were authorized.
Please understand that if your security research involves the networks, systems, information, applications, products, or services of another party (which is not LogSnitch), that third party may determine whether to pursue legal action. We cannot and do not authorize security research in the name of other entities.
We will not share your report with a third-party without your permission and/or gaining their commitment they will not pursue legal action against you. Please note again that we can’t authorize out-of-scope testing in the name of third parties and such testing is beyond the scope of the program.
Please submit a HackerOne report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy.