Thank you for paying attention to our service. We value and reward security experts who report vulnerabilities in our services, thereby helping us ensure the security of our users.
If the issue you reported to Ringostat complies with the rules below, we will not initiate any legal action against you and will not involve law enforcement agencies to investigate. We ask that you do the following:
You give us enough time to analyze and resolve the issue you reported before publishing your report or sharing this information with others. Do not interact with any individual accounts (including modifying or accessing the account data) without the consent of their owners.
You make an effort in good faith to avoid privacy violations and disruptions to others, including (but not limited to) unauthorized access to or destruction of data and interruption or degradation of our services.
You must not intentionally violate any applicable laws or regulations, including (but not limited to) laws and regulations prohibiting the unauthorized access to data.
You do not exploit a security issue you discover for any reason other than for testing purposes, and you do not conduct testing outside of your account, a test account, or another account for which you have the explicit written consent of the account owner to test. (This includes demonstrating additional risks, such as the risk that the security issue could be used to compromise sensitive company data or another user's account.)
You are not authorized to access user or company data including (but not limited to) personal data.
Adhere to a responsible disclosure policy (see above).
Report a security bug: that is, identify a vulnerability in our service (we are accepting only reports about app.ringostat.com) or infrastructure which creates a security or privacy risk.
Remember that the degree of risk is determined by Ringostat and many software issues do not create security vulnerabilities.
We have deliberately excluded some types of potential security issues. See the "Program Scope" section below.
If during the investigation of the vulnerability you inadvertently violated the confidentiality or work of other people (for example, you gained access to account data, service configurations or other confidential information), you must indicate this in your report.
When researching vulnerabilities, use test accounts. If you cannot reproduce the issue using a test account, use a real one (but not for automated testing). Do not interact with other accounts without the consent of their owners.
Please send your report to [email protected]
We investigate and respond to all valid reports.
We receive a lot of reports, therefore, we first study the most important for risk and other factors. As a result, we may need some time to respond.
In the event of the receipt of several reports on the same issue, the reward will be received by the person who first reported it. (Ringostat's specialists determine whether the reports are duplicated and do not inform the people who sent them about other reports.)
We reserve the right to publish reports (and the updates accompanying them).