Table of Content

1. Objective, Scope and Responsibilities

1.1. Objective

The purpose of this document is to create processes and rules guiding the communication and reward process related to vulnerability reports which external security researchers provide.

The program acts as a source for the vulnerability management program and therefore the associated vulnerability intelligence collection process.

1.2. Scope

The bug bounty program is limited to vulnerabilities affecting the Passbase products or infrastructure included in the Information Security Management System. The vulnerabilities affecting third-party hosted platforms are not included in the scope of this program.

1.3. Responsibilities

The Head of Security is responsible for the reward mechanism, with the support of the Passbase operations effort which will pay the reward.

2. Process

2.1. Collection

2.1.1. Communications

Security researchers must fill the form at https://forms.gle/piEvEVzCLNoJdMvR7

2.1.2. Tracing

Once the vulnerability report is received through authorized channels, the report must be traced using the methodology described in the vulnerability management program.

Vulnerability reports are linked to sources.

New report sources must be traced, as described in the Intelligence Program.

2.2. Review

2.2.1. Format