2022-01-10 18:20:24 +00:00
|
|
|
ente believes that working with security researchers across the globe is crucial to keeping our
|
|
|
|
users safe. If you believe you've found a security issue in our product or service, we encourage you to
|
|
|
|
notify us (security@ente.io). We welcome working with you to resolve the issue promptly. Thanks in advance!
|
|
|
|
|
|
|
|
# Disclosure Policy
|
|
|
|
|
|
|
|
- Let us know as soon as possible upon discovery of a potential security issue, and we'll make every
|
|
|
|
effort to quickly resolve the issue.
|
|
|
|
- Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a
|
|
|
|
third-party. We may publicly disclose the issue before resolving it, if appropriate.
|
|
|
|
- Make a good faith effort to avoid privacy violations, destruction of data, and interruption or
|
|
|
|
degradation of our service. Only interact with accounts you own or with explicit permission of the
|
|
|
|
account holder.
|
|
|
|
- If you would like to encrypt your report, please use the PGP key with long ID
|
2022-01-10 18:40:48 +00:00
|
|
|
`E273695C0403F34F74171932DF6DDDE98EBD2394` (available in the public keyserver pool).
|
2022-01-10 18:20:24 +00:00
|
|
|
|
|
|
|
# In-scope
|
|
|
|
|
|
|
|
- Security issues in any current release of ente. This includes the web app, desktop app,
|
|
|
|
and mobile apps (iOS and Android). Product downloads are available at https://ente.io. Source
|
|
|
|
code is available at https://github.com/ente-io.
|
|
|
|
|
|
|
|
# Exclusions
|
|
|
|
|
|
|
|
The following bug classes are out-of scope:
|
|
|
|
|
|
|
|
- Bugs that are already reported on any of ente's issue trackers (https://github.com/ente-io),
|
|
|
|
or that we already know of. Note that some of our issue tracking is private.
|
|
|
|
- Issues in an upstream software dependency (ex: Flutter, Next.js etc) which are already reported to the upstream maintainer.
|
|
|
|
- Attacks requiring physical access to a user's device.
|
|
|
|
- Self-XSS
|
|
|
|
- Issues related to software or protocols not under ente's control
|
|
|
|
- Vulnerabilities in outdated versions of ente
|
|
|
|
- Missing security best practices that do not directly lead to a vulnerability
|
|
|
|
- Issues that do not have any impact on the general public
|
|
|
|
|
|
|
|
While researching, we'd like to ask you to refrain from:
|
|
|
|
|
|
|
|
- Denial of service
|
|
|
|
- Spamming
|
|
|
|
- Social engineering (including phishing) of ente staff or contractors
|
|
|
|
- Any physical attempts against ente property or data centers
|
|
|
|
|
|
|
|
Thank you for helping keep ente and our users safe!
|