
TomTom
External Program
Submit bugs directly to this organization
TomTom is committed to maintaining the highest level of security for our products, services, and users. We appreciate your efforts in identifying and reporting potential security vulnerabilities in our systems and applications.
This policy outlines our commitment to working with security researchers to resolve vulnerabilities responsibly.
The following vulnerabilities are generally considered out of scope for our program:
| Category | Description |
|---|---|
| Social engineering | Phishing, vishing, or other social engineering attacks. |
| Physical security | Access to buildings or data centers. |
| Denial of service (DoS) | Attacks that aim to disrupt service availability. |
| Spamming | Sending unsolicited messages. |
| Password brute-forcing | Automated attempts to guess passwords. |
| Clickjacking without impact | Reports of clickjacking without a clear security impact. |
| CSRF on low-impact forms | CSRF on forms with minimal security impact (e.g., contact forms). |
| Self-XSS | Vulnerabilities that require the user to execute the attack themselves. |
| Missing security headers without impact | Missing headers (e.g., X-Frame-Options) without a clear security consequence. |
| Best practice suggestions | General security advice or recommendations. |
| Third-party library issues | Vulnerabilities in libraries or frameworks, unless related to our implementation. |
| Outdated software versions | If a newer, patched version is available. |
| Publicly known vulnerabilities | Vulnerabilities that have already been disclosed. |
| Email not verified for account registration | Cases where email verification is not enforced. |
| Insufficient session logout | Session issues without demonstrable impact on user security. |
| Weak password policy | Reports about missing complexity requirements (e.g., length, special characters). |
| Open redirections without impact | Open redirections without direct impact on account compromise or data disclosure. |
| Destructive testing on repositories | Any testing that could damage or alter repository content or functionality. |
Please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization. Follow HackerOne's disclosure guidelines: https://www.hackerone.com/disclosure-guidelines
Thank you for your interest and help in protecting the security of TomTom's products and services.