At Auction Sniper, we take security and privacy very seriously. We believe that responsible security researchers across the globe are critical in identifying vulnerabilities in any technology. Auction Sniper welcomes and encourages security researchers to report vulnerabilities with our systems and we appreciate your efforts to make the internet a safer place.
How the Program Works
Researchers shall disclose potential vulnerabilities in accordance with the following guidelines:
- Let us know as soon as possible upon discovery of a potential security issue and we'll make every effort to quickly resolve the issue.
- Please avoid any privacy violations, degradations and disruption to our production systems during your testing.
This includes any activity that has an impact on the availability of our systems, including the use of vulnerability scanning tools.
- Do not access data of other users and solely use your created accounts.
- Do not attempt to brute-force or spam our systems.
- Never exploit a vulnerability you discover to view data or alter data without authorization.
- Do not do anything illegal. Researchers are responsible for complying with local laws, restrictions, regulations, etc.
- Please keep information disclosed confidential between yourself and Auction Sniper, until we resolve the issue.
Again, we will make our best efforts to fix issues in a short time frame, but some vulnerabilities take longer than others to resolve.
By responsibly submitting your findings to Auction Sniper in accordance with these guidelines Auction Sniper agrees not to pursue legal action against you. Auction Sniper reserves all legal rights in the event of noncompliance with these guidelines.
Once a report is submitted, Auction Sniper commits to provide prompt acknowledgement of receipt of all reports and will keep you reasonably informed of the status of any validated vulnerability that you report through this program.
Please report any security issues you find to email@example.com. If your submission contains any sensitive vulnerability information, please encrypt it using our PGP public key at the bottom of this page.
Please include the following in your submission:
Certain vulnerabilities are considered out of scope for our Responsible Disclosure Program, including:
- Your name and contact information
- Company name (if applicable)
- A detailed description of the potential vulnerability.
- Exact steps to reproduce the issue, including any associated URL and parameters demonstrating the vulnerability, proof of concept links and/or payloads.
- Any relevant details of your system’s configuration, such as any browser or user-agent information where the tests were conducted.
- Your IP address and Auction Sniper account, to assist with coordinated log review.
- Social engineering (including phishing) of Auction Sniper staff, contractors, or users
- Resource Exhaustion attacks
- Self XXS
- Vulnerabilities only affecting users of outdated or unpatched browsers and platforms
- Reports from automated tools and/or scans
- Bugs in 3rd party software
- Physical attacks on our infrastructure
- CSV Injection
- SSL/TLS Best Practices
- X-Frame-Options related
- Missing security headers which do not lead directly to a vulnerability
We want to make sure to sincerely thank you for your disclosing security vulnerabilities responsibly and working with us to improve our security. We understand the work and talent you've put into finding these issues and appreciate you reaching out to us.
Our PGP Key
If you are submitting sensitive vulnerability information or wish to communicate with us privately about your concern, we encourage you to use the following PGP key to encrypt your message to us.
-----BEGIN PGP PUBLIC KEY BLOCK-----
-----END PGP PUBLIC KEY BLOCK-----
Last Updated: June 2020