urbanairship.com
External Program
Submit bugs directly to this organization
External Program
Submit bugs directly to this organization
Purpose
Our aim is to provide the best services we can in a highly secure fashion. We take security very seriously. Part of that is communication with the security community at large. We are providing this policy as a way to get in touch with us when researchers spot issues within our system. This gives researchers a way to give us feedback and to act as a guide for communication between the researcher and Airship.
Airship’s security policy provides guidelines for interaction between our company and security researchers. Upon discovering a security issue and communicating it with [email protected]), a researcher can expect a response within seven days. We conform to the ISO/IEC 29147:2018 and ISO/IEC 30111:2019 standards, ensuring our practices align with international guidelines for vulnerability disclosure and handling processes.
Airship is responsible for delivering status updates at least once every seven days until the problem is resolved or a fix is scheduled for release. We ask for full participation from researchers during this period.
Working with Airship is, of course, a voluntary choice, and a choice that hopefully researchers respect and accept accordingly. The goal of following this policy, above all else, is education: for Airship, for the researcher, our customers, and the community.
This hypothetical workflow illustrates the simple set of guidelines at work behind this policy:
Report Template | Description | Title of the report
| Concise summary categorising the vulnerability, and the site/application where it can be found. (E.g [Reflected XSS] airship.com)
| URL / Asset
| Web address, IP address, product, service name, etc.
| Weakness
| CWE, CVE, etc.
| Severity
| Such as low, medium, high, critical, and the calculated via https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
| Description of the Vulnerability
| A summary of the vulnerability,
| Supporting files
| Screenshot or Video
| Steps to reproduce
| Clear and descriptive steps to reproduce the vulnerability.
| Impact
| The effects of successfully exploiting the vulnerability.
| Recommendations
| Any mitigations
|
Please only test services to which you have authorized access. The following testing is not allowed:
Threat | Bounty | Description | Denial of Service
| NONE
| Any action that disables or makes Airship resources unavailable
| Distributed Denial of Service or Rate Limiting
| NONE
| Performance testing, maxing out network bandwidth, or overloading resources with multiple sources
| Brute Force Attacks
| NONE
| Persistent or iterative attacks against Airship production environments
| Using components with Known Vulnerabilities
| NONE
| Reporting 3rd party components or libraries Airship is currently using are out of date or vulnerable
| Bulk Export of Data
| NONE
| Removing data from Airship without our permission in bulk from our systems.
| Non-Disclosure of Security Bug
| NONE
| No bounty or acknowledgement will be issued for disclosing a bug or vulnerability publicly without informing Airship in accordance with this policy
| DNS, DNSSEC, SPF or DMARC Configuration Suggestions
| NONE
| Any suggestions involving the current configurations around these systems and protocols will NOT be acknowledged.
| HTTP, HTTPS or TLS Security Header Configuration
| NONE
| Any suggestions involving the current configurations around these protocols will NOT be acknowledged.
|
The following URLs are in scope for our program: www.airship.com www.airship.eu www.gummicube.com www.apptimize.eu www.apptimize.com analyze.airship.com analyze-api.airship.com docs.airship.com go.airship.com sftp.airship.com support-eu.airship.com support.airship.com team.airship.com accengage.net device-api.urbanairship.com combine.urbanairship.com
We deeply appreciate the contributions of security researchers like you. Currently, we only offer non-monetary rewards for each confirmed vulnerability report. These rewards include a T-shirt to proudly showcase your achievement. Additionally, all eligible researchers will be honored with a well-deserved place in our prestigious Hall of Fame, where your name will be displayed among the talented individuals who have made significant contributions to improving our security posture.
To send secure emails to our security team, please use the following PGP Fingerprint: 0x8ECBD357243F4CF0
This is an open-ended dialogue. If there is anything missing, you have a question, or if you’re just curious, please send us an email at mailto:[email protected].
The hall of fame recognizes researchers findings publicly for the last four quarters. Thank you to everyone for your submissions and for working closely with Airship.
Researcher | LinkedIn | Country | Quarter | Finding | Date | Harsh Maheta
| https://www.linkedin.com/in/harsh-maheta-7057542a9
| India
| Q2 FY26
| Configuration Error
| 2025/05/28
| Jay Mehta
| https://www.linkedin.com/in/jay-mehta-197b99116
| India
| Q3 FY26
| Open Redirect
| 2025/09/22
| Emmet Leahy
| N/A
| Ireland
| Q4 FY26
| Misconfiguration
| 2025/12/03
| Reyhan Syah
| https://www.linkedin.com/in/rhyru-2714a5277/
| Indonesia
| Q4 FY26
| Misconfiguration
| 2025/12/27
|