Binalyze gives great importance to the security of its applications, services, and cloud platforms which are provided to its customers. If you are a security researcher/analyst and have discovered a security vulnerability in one of our services or applications, we appreciate your help by disclosing it to us in a responsible manner. We will validate and fix vulnerabilities that you designated in accordance with our relevant policies. Binalyze reserves all its legal rights in the event of any non-compliance to the applicable laws and regulations.
If you make a good faith effort to comply with this policy during your security research, we will consider your research to be authorized. We will work with you to understand and resolve the issue quickly, and Binalyze will not recommend or pursue legal action related to your research. Should legal action be initiated by a third party against you for activities that were conducted in accordance with this policy, we will make this authorization known.
If you believe you have found a security issue/vulnerability in one of our services, systems, or applications;
Accessing, Downloading, or Modifying data residing in an account that does not belong to you or attempt to do any of the foregoing,
Executing or attempting to execute any “Denial of Service” attack,
Posting, transmitting, uploading, linking, sending, or storing any malicious software,
Testing in a manner that would result in the sending unsolicited or unauthorized junk mail, spam, pyramid schemes, or other forms of duplicative or unsolicited messages,
Testing in a manner that would degrade the operation of any Binalyze properties; or testing third-party applications, websites, or services that integrate with or link to Binalyze properties,
Investigating/exploiting issues with outdated or unpatched browsers,
Investigating/exploiting the lack of the Secure Flags on non-sensitive cookies,
Investigating/exploiting the lack of the HTTP Only flags on non-sensitive cookies,
Security vulnerabilities in third-party websites and applications that integrate with issues,
Vulnerabilities requiring a potential victim to install nonstandard software or otherwise take steps to become susceptible to attack,
Social engineering of vulnerabilities requiring very unlikely user interactions,
Investigating/exploiting findings primarily from social engineering (e.g., phishing, vishing),
Investigating/exploiting findings from physical testing such as office access (e.g., open doors, tailgating),
UI/UX bugs and spelling mistakes,
Spamming,
Disclosure of known public files or directories (e.g. robots.txt),
Click-jacking and investigating/exploiting issues only exploitable through click-jacking,
CSRF on forms that are available to anonymous users (e.g. the contact form),
Logout Cross-Site Request Forgery (logout CSRF),
Investigating/exploiting the presence of application or web browser ‘autocomplete’ or ‘save password’ functionality,
SSL Attacks such as BEAST, BREACH, Renegotiation attack,
Investigating/exploiting SSL Forward secrecy not enabled,
Investigating/exploiting SSL Insecure cipher suites,
Investigating/exploiting the Anti-MIME-Sniffing header X-Content-Type-Options,
Investigating/exploiting the missing HTTP security headers.
If you identify a valid security vulnerability in compliance with this Responsible Disclosure Policy, Binalyze shall:
Binalyze will review the submission to determine if the finding is valid and has not been previously reported. Publicly disclosing the submission details of any identified or alleged vulnerability without expressed written consent from Binalyze will deem the submission as non-compliant with this Responsible Disclosure Policy.