WSO2.Telco
External Program
Submit bugs directly to this organization
#Information
If you believe that you have found a security vulnerability on WSO2.Telco or our product portfolio, we encourage you to let us know straight away. We will investigate all legitimate reports and do our best to quickly fix the problem. Before reporting though, please review this page, including our responsible disclosure policy, reward guidelines and things that should not be reported. If you are looking to report another type of issue, please notify us immediately at [email protected]. At WSO2.Telco, we treat any form of security breach and/or vulnerability exploitation with the utmost seriousness and would take action immediately in the best interest of the company and our clients. In doing so, if you comply with the policies below when reporting a security issue to WSO2.Telco, we will not initiate legal action or law enforcement investigations in response to your report. We ask that: ● You give us reasonable time to investigate and mitigate an issue you report before making public any information about the report or sharing such information with others. ● You do not interact with any entities or personnel outside of the WSO2.Telco vulnerability assessment team, you do not modify and immediately cease accessing any data that you may have already accessed. ● You make a good faith effort to avoid privacy violations and disruptions to others, including (but not limited to) unauthorized access to or destruction of data, and interruption or degradation of our services. ● You do not exploit a security issue you discover for any reason. (This includes demonstrating additional risk, such as attempted compromise of sensitive company data or probing for additional issues.) ● You do not intentionally violate any other applicable laws or regulations, including (but not limited to) laws and regulations prohibiting the unauthorized access to data. ● For the purposes of this policy, you are not authorized to access user data or company data, including (but not limited to) personally identifiable information and data relating to an identified or identifiable natural person.
#Bug Bounty Programme Terms
We recognize and reward security researchers who help us to keep people safe by reporting vulnerabilities in our services. Monetary bounties for such reports are entirely at WSO2.Telco’s discretion. To be considered for our bounty program, you first need to meet the following requirements: ■ Adhere to our responsible disclosure policy (see above). ■ Report a security bug: identify a vulnerability in our services or infrastructure which creates a security or privacy risk. WSO2Telco ultimately determines the risk of an issue. ■ Complete disclosure to WSO2.Telco team on method and technique for exploiting vulnerability. ■ Disclose any data that was downloaded and destroy any data and or copies made of it. ■ Submit your report via [email protected] and respond to the report with any updates. Please do not contact employees directly or through other channels about a report. ■ If you inadvertently cause a privacy violation or disruption (such as accessing restricted data, service configurations or other confidential information) while investigating an issue, you must disclose this in your report. ■ Use best practices in safeguarding data and system integrity when investigating issues. In turn, we will follow these guidelines when evaluating reports under our bug bounty programme: ■ We investigate and respond to all valid reports. We prioritise evaluations based on risk and other factors, and it may take some time before you receive a reply. ■ We determine bounty amounts based on a variety of factors, including (but not limited to) impact, ease of exploitation and quality of the report. If we pay a bounty, the minimum reward is USD 300. Note that extremely low-risk issues may not qualify for a bounty at all. ■ We aim to pay similar amounts for similar issues, but bounty amounts and qualifying issues may change over time. Past rewards do not necessarily guarantee similar results in the future. ■ In the event of duplicate reports, we award a bounty to the first person to submit an issue. WSO2.Telco determines severity and may not share details on the other reports.) A given bounty is only paid to one individual. ■ We reserve the right to publish reports (and accompanying updates). ■ We verify that all bounty awards are permitted by applicable laws, including (but not limited to) US trade sanctions and economic restrictions. WSO2.Telco may retain any communications about security issues that you report for as long as we deem necessary for programme purposes, and we may cancel or modify this programme at any time.