firsttime

Responsible
disclosure

Help us keeping our systems secure, avoiding any unecessary risks to end users.


Responsible disclosure

Responsible Disclosure is a method to report system vulnerabilities that allows the recipient sufficient time to identify and apply necessary countermeasures before making information public.

Security is core to our values, and we value the input of security researchers acting in good faith to help us maintain a high standard for the security and privacy for our users.
This includes encouraging responsible vulnerability research and disclosure.
This policy sets out our definition of good faith in the context of finding and reporting vulnerabilities, as well as how we handle your report.

By following this controlled and ethically correct reporting model, the sender helps companies identify and resolve system flaws, thus providing a valuable and efficient contribution to increasing the security of our services and avoiding damage or disruption to the systems involved.

To send a detected vulnerability, write to security@skipso.com.

Below you will find the rules to follow.

Whenever customers, researchers, or experts should identify one or more vulnerabilities in the websites/platforms using SkipsoLabs' technology, they are encouraged to send 
the information to SkipsoLabs following the procedure laid out below.

Using the following procedure, whoever informs SkipsoLabs of a system vulnerability is required to make a responsible disclosure to avoid exposing other clients to unnecessary security risks.

The reporting person must avoid performing any activity that can disrupt the impacted system or service or cause any data leakage/loss, refraining from accessing data not strictly necessary to prove the existence of the vulnerability.
 Any activity on the impacted system/service must be carried out in full compliance with the provisions of the present policy.
Moreover, the use of intensive or invasive scanning tools is not allowed.

Responsible disclosure implies that the reporting person has not disclosed data to any other parties without consent.

Specifically, whoever activates the procedure should:
  1. Send the information via email to security@skipso.com with the following details:
    • Personal data (name, surname, and, if applicable, organization for which the person works)
    • The type of vulnerability identified
    • The complete URL(s) impacted by the flaw
    • A detailed description of the problem encountered
    • IP address from which the vulnerability was identified, together with the date and time of discovery
    • A compressed archive (zip) with all the files which can help in reproducing the flaw (i.e. images, screenshots, text files with description details, PoC, source code, scripts, pcap traces, logs, source IP addresses, …).
      The maximum dimension of the archive cannot exceed 10MB. If the archive is password protected please specify the password in the body of the mail.
  2. Observe strict secrecy on all information pertaining to the vulnerabilities discovered, and therefore commit not to reveal any of these, entirely or partially, or in any form make them available to third parties for a period of not less than 90 days, allowing SkipsoLabs the required time to identify and apply the necessary countermeasures.
    In especially complex cases, SkipsoLabs reserves the right to extend this period, giving appropriate notice to whoever sent the information.
  3. In the cases where the information regarding the vulnerabilities comes from a legal entity (public or private), corporation, consortium or other associative body, the sender must take the necessary steps to limit access to said information to those employees who require the use of the affected system for their work activities, enacting all suitable and appropriate measures to maintain confidentiality and above mentioned limits while accessing and using the information.
Once a notice has been received, SkipsoLabs  is committed to following up as follows:

  • Send an email to the reporting person/entity to acknowledge reception of the mail with the information outlined above
     Within 10 days from this confirmation SkipsoLabs will send a second email with an evaluation of the relevance of the vulnerability and the results of an initial analysis.
  • Adequately manage the vulnerability report so as to respect the timeline indicated previously and, in case of an eligible report on a vulnerability that is not already being handled, publicly thank the sender in the Hall of Fame section, if the necessary authorization accompanied the original mail.
SkipsoLabs does not offer economic rewards.
Moreover, SkipsoLabs reserves the right not to manage reports which do not respect the criteria indicated in this procedure.

SkipsoLabs stresses the importance of assuming responsible behavior even after the release of any patch as the rollout process can be long and complicated.
Therefore, we ask a careful evaluation of information released in this regard, with the objective of safeguarding user security.

Below you will find some examples of vulnerability categories that are considered eligible for publication in the Hall of Fame:
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF)
  • Injection (i.e. SQL injection, user input)
  • Broken Authentication and Session Management
  • Broken Access Control
  • Security Misconfiguration
  • Redirect / Man in the Middle attacks
  • Remote code execution
  • Underprotected API
  • Privilege Escalation
On the other hand, the following situations are not covered by this Responsible Disclosure initiative and therefore are not eligible for the Hall of Fame:

  • Situations which are not inherent to security aspects (i.e. unavailability of a service, bugs in the UI, etc.) and therefore managed through traditional channels of customer care.
  • Problems regarding phishing or spam and vulnerabilities inherent to social engineering techniques; these must be signaled through the platform's contact form.
  • Results of automatic tools for vulnerability assessment/penetration testing (i.e. nessus, nmap, …).
  • Reports on the use of weak configurations of the TLS protocol, or reports on non-compliance with best practices, such as, for example, the lack of security headers.

SkipsoLabs reserves the right to update this Responsible Disclosure procedure at any time.
We would like to thank everyone who disclosed responsibily a security issue, recognizing their valuable contribution in increasing the security of our services.

- 2021

  1. Anonymous | DNS misconfiguration
  2. Shivam Pravin Khambe (twitter.com/ShivaRa42316756) | XSS vulnerability
  3. Suraj Satish Kharade (linkedin.com/in/suraj-kharade-17a1561a4) | DNS misconfiguration
  4. Suraj Satish Kharade (linkedin.com/in/suraj-kharade-17a1561a4) | Security misconfiguration