Vulnerability Disclosure Policy
Within ThreatFabric, great value is placed on (information) security. However, no matter how much effort we put into this, there can still be vulnerabilities present. If you discover a vulnerability, we would like to know about it, so we can take steps to address it as soon as possible. Please follow the instructions below:
Email your findings to security@threatfabric.com. If possible, please encrypt your findings using our PGP key to prevent this critical information from falling into the wrong hands:
PGP Fingerprint = 87DF BB9F E881 89B7 C9FF CDD5 9339 15A4 F60B 39BD
-----BEGIN PGP PUBLIC KEY BLOCK-----mQINBGeFQloBEADxfbuiy5S5vn3ItRVV2kKVh1OKflpz+SkyS1rGOmZqagnk9RT6IWgBUqa2PsphUBd7wL0IojpO5xOPv+6N7Nzru3MGwQxwPnkucDO7Pvfs30z4Sac1mCq4cAYnxA2SQCaxDJDWnHt1YjaSngdFUTFhYn5ZNfY6p+T0Mv//YLZ1dybqVXlU7UPXXdKy2GHOT0aILe1eWAqYzgLd1i/xXjwqf3DsDbH3tadL76WUpl0JusWrDQ45EUvNzoHv2RLSXNrfPrmEbiOMiZelRwHvVpf9ieCXkhEWjuTgKQGp9sbxM29wrNsKtk+uvXCYzmBjTKQ8ApOb4uo0jRE9KaaEXzB0OWXWzpX6ZvtFBU+KwJqlZltaB+pN4Pllm/aIAB6m0jq0ReT/YquD74cHJ3oM26VVxJ1ayzxr86wql0uJ7XPHQIBAlwT+zwyvZBoOTkcUDBjrELowI9zURH4/LE+kgfyBIWNBLMEtNBW5dU4URnT+udp4y8D2W2v50+OFwsKk92sEK1eU2vEB29yrcjqEoHkdO2B/5A9gtdxQyeSrdzMM2STQczQ3ykiLYkUzRKBZr94lzPde43GdA+HaZqq835mUUr6xfcT8AnMq/5ni9qyTJOYYwv/vKNJtp7vznY2ZkCWgngBOqU56N4U3cNj93uxE5QiViGriEP9myZaAB+eqYwARAQABtDFUaHJlYXRGYWJyaWMgU2VjdXJpdHkgPHNlY3VyaXR5QHRocmVhdGZhYnJpYy5jb20+iQJOBBMBCAA4FiEE70Otcr0fvU8/+dewPY8JAuMMORkFAmeFQloCGwMFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AACgkQPY8JAuMMORm/HA//TmgjPUopO1dadJSxJ08tFgpJ7WoR/tE1lecQS7dDhlNPWJ2CSJ/Q+kac74x+RazyhhD0J2XMlgeI7rIXUeaxZkM7M+oexZlXn0uZXghd+R9IXNpR4v/Bs1ZQk4LEiOTkDz8jUsexoGo/6QBve+HdtaOCfULuyDjCtAobVMuMpsztJeJp0qcBvnlCUnkGOR76/flzvy6RXy2o/M12zRa/N8UWDn7SBkhY0wumHjMjMVZedPhXoieFo5p4jmpZotwScpYxL/Awvyx92isPLtdO4smMk9cdEledmsLaetN5gOcjnGWiQob2keQpBcA63ujZTW0qjA65TIHi9XSS/SvUukNSBWuZdygY6YpVQ3kUPBeXbKDyDGyAhT/MChzdnuY1cdbcGHjN84vCKMD4OzqrU6eL+ZTEixkcQM2S+NGPrgQgck8gUJAxnHNSkwCl6/c5UdkmLOs/Z5/4qj2qCk0XH8U+OB5RCI1chNJ1G2LbXkbEe/Fb9n0L7J2iP9fpDQEvTXXpBuNOyJmwNoAlnLaOBIIptRzhg9xvyh79ww7OTlcgVXW543zaazaJWo2+71ZWL6fi8qYG1ED9nMHwHS8glHiLvjgd8H5feCi2Ejpb+htflgQTCW4nksq2kRw6Gd+UB/UclNsZrt+gNMfXR1BR1kpSBe6XJzt8mHAGUFZnTKu5Ag0EZ4VCWgEQAJiWFJ1UFJ8cZ3OfCqQcofKspunNIBDa7ghWrgGUFMEm2Cgb6sJIqX64i8UzOPeGyGsKWzBeKcPdoXdoS5HNOb3hFc/UGtD8ZAgoB5erhRsqzKWmPsXRR4K/vNJ+TrtF3yCqI93r4VtlqvsVe/fQYJaofMgCob4+R/dPNA6gBhcEsapj0BTO/zZqQ7kmYtl9JFv4xakgMfUDm3XGWCuEyPDLZoCjS/suoL0+c+Ni9kxHLbCCSR2NvYXmFdC/vs5qneteAoK/x5pUB78qTVmiP+zZlEyYcq09XaPuFTT7Qc2EMt9yXk+VHrlfUwUKLRj60rAg+ckbWKZj/U5YNQMNyDiA2UhU1+Fpog9LoDRimCTLZXIGexwiNOr/HXfDswum9DEHCiP2uUKHqy+yZDFOTtim1Za7Oju2TR08etrkBHXjQ+jVnCy8J3/YR9lYLnLCCJUPEfQ9K2Ndw7MZVM51nOrexRQXsDbQM3SNz43LGZtM/nDiAzLnUCduxiAJkcqEQgpqACpKNQeYkjDS+v8GDJm4gpXppe0YHgCN5wNRE6oQTApPDS8lUVw+Ct2SKfOVyD/Ek4k5iYi0wAoY33STE48Z7MCna5rsk/bwIMOJErP7/SoN3pVRvwMYk8UexEU+UUmJwpygoW5fmQ0ThtCFuMTMuXYJWee9PKxelB9X+ganABEBAAGJAjYEGAEIACAWIQTvQ61yvR+9Tz/517A9jwkC4ww5GQUCZ4VCWgIbDAAKCRA9jwkC4ww5GQQMEACcUzU1SvhrwqTFsKLnf0YzV/EF/mWIeetC7HT4UNKXt6pCzO1fjuQRAyMYpaHuMn+UNa6qBa/8PlSok0W67WfdByEG1TEiKKi4Q3dHLeikxNSQKH6byrSCXc+0DK40EFvWRpCmqPScv8BBse9KqG0cVEg+GLv1tN0SZNP6OskpAaYffYRZSeGxKZDRhrSYipAs9TLVP5Bgm1L0dJVsE9o8gk6IVBkm1aRqccNmUoPemuzn4MADEq0VGceUNeZizJqBaz0YeDHFgaksyXJ462WQDZTti89bx6qMhDFkv1XeE2a3rK6qqfwdyUoovoCLVJRxzf1L3cqHo7Em63J+eKoZFA9D5arb6ekj4iWJVMyvx7cAfvCUYNQbid5ituwusZ2h6F+jLJ3gaK5WjbSqsYzpbcmqYrFtj3UhllyIN7+o8S4rll19KK9vZfDRSvdA1HjOldp5Slw7XyLBFC80De/S1O4ao9f+NxR9X2ppZcl294fEgw7aDuU3Luhswsq3ojLONDeAFcl5pqugMKb7aHiq2xtVITbviS2jLsEBYDaB9eqn8WDvO4G9ptK0oJkb8rfLjj0IYNYLE5G5CUwZL0YXTRpo6uv/MRHKK6R7fcv0aTBzl/eKT3zUTj4w68w/Md056HCQAz93r/QANC8by5QumiCHDP/qDlmNItJ0rjccwQ===JOUP-----END PGP PUBLIC KEY BLOCK-----We require you:
- Not to take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying existing data.
- Not to reveal the problem to others until it has been resolved.
- Not to use the information to execute attacks on physical security, applications of third parties or perform social engineering, distributed denial of service, phishing, or spam.
- To provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Usually, the IP-address (or the URL) of the affected system and a description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation.
We promise you:
- We will respond to your report within five business days.
- We will not take legal action against you regarding the information you shared with us if you have followed the instructions above (paragraph ‘We require you to’).
- We will handle the information you shared with us with strict confidentiality, and not pass on your personal details to third parties without your permission.
- We strive to resolve all problems as quickly as possible.
Exclusions
This vulnerability disclosure is not intended for:
- reporting complaints.
- reporting fake emails (phishing emails).
- reporting fraud.
We also exclude specific problems that, in our opinion, do not constitute a threat.
Excluded systems
All systems other than domains ending in:
- threatfabric.com.
- threatfabric.org.
- threatfabric.net.
Excluded types of security problems
- SPF/DMARC records.
- (D)DOS attacks and rate limiting of calls.
- Problems that amount to self-XSS.
- Error messages without sensitive data.
- Software (version) disclosure.
- Resolved vulnerabilities.