The following vulnerability disclosure policy addresses the procedures for reporting and handling disclosures for the following properties that are in scope.
We look forward to working with the security community to find vulnerabilities in order to keep our customers safe.
Cloudonix will award bounties for any vulnerability disclosure that results in fixing an issue, as per the following guidelines.
If you would like to report vulnerabilities for any other service not listed, please do so by emailing security@cloudonix.io, though we do not guarantee any outcome nor even the possibility of receiving a reply.
staging
name, as part of their FQDN, and/or resource names.staging
platform).Send the report to security@cloudonix.io
The following services are in scope of this vulnerability disclosure policy:
api.staging.cloudonix.io
, api.cloudonix.io
sip.staging.cloudonix.io
, wss.staging.cloudonix.io
, *.sip.staging.cloudonix.io
, *.staging.cloudonix.net
cockpit.staging.cloudonix.io
Resources without the staging designator are production services and are out of scope for the purpose of the vulnerability disclosure policy.
For each of the above listed properties, if you discover a vulnerability – please send an email, with as much details as possible, to security@cloudonix.io. Please provide – at a minimum:
Cloudonix does not award rewards for vulnerability disclosure on our commercial web properties. These are considered
non-mission-critical and may contain multiple minor issues that are either deemed acceptable risk or are part of required
functionality – and that we have no intention of investing resources to “fix”.
Cloudonix will award bounties for any vulnerability disclosure that results in fixing an issue that is either:
For the purpose of such disclosure, Cloudonix internal customer accounts are not considered customer accounts or non-public data.
Additionally Cloudonix deems customer’s privileged access gained by guessing customer controlled credentials, or by circumventing a third-party service, to be lawful access that is not a vulnerability.
Cloudonix will award bounties for any vulnerability disclosure that results in fixing an issue that is either:
For the purpose of such disclosure, Cloudonix internal customer accounts are not considered customer accounts or non-public data.
Additionally Cloudonix deems customer’s privileged access gained by guessing customer controlled credentials, or by circumventing a third-party service, to be lawful access that is not a vulnerability.
Details for all payouts are available on our HackerOne page.