follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Author Topic: Pleo Bug Bounty  (Read 14530 times)

Angelina

  • Moderator
  • Experienced Member
  • *****
  • Posts: 357
    • View Profile
Pleo Bug Bounty
« on: July 20, 2023, 06:47:16 pm »
submit bug report: https://www.pleo.io

Policy

Pleo looks forward to working with the security community to find security vulnerabilities.
Please submit any questions you might have to security@pleo.io.
Join our private program
Pleo runs a private program. Joining the private program grants you access to a larger attack surface and resources that will aid you in your research. Please email us at security@pleo.io to request an invitation to the private program.
Rewards & eligibility
Severity   Bounty
Critical   $3,000
High   $1,000
Medium   $500
Low   $200
Our rewards are based on the severity of a vulnerability. Pleo uses CVSS 3.0 (Common Vulnerability Scoring Standard) to calculate severity. Please note, however, those reward decisions are up to the discretion of Pleo.
Guidelines
In general, use good judgment and common sense. Don't engage in activities that might harm Pleo and/or our customers.
Please refrain from bothering our support staff with cat/dog images, XSS payloads, social engineering attempts, and stuff like that. They are busy supporting our customers. If you want to find bugs in our customer support software, please consider getting in touch with Intercom instead.
Please make sure to document the security impact of the vulnerability you are reporting on. Only vulnerabilities that have a security impact for Pleo and/or customers will be eligible for a reward.
Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the vulnerability, the vulnerability will not be eligible for a reward.
When duplicates occur, we only award the first report that was received.
Please submit multiple reports if you want to receive rewards for multiple vulnerabilities. Feel free to chain multiple vulnerabilities in order to achieve a security impact or elevate severity.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
Please observe HackerOne's disclosure guidelines.
Out-of-scope vulnerabilities
The following types of vulnerabilities are outside the scope of our rewards program:
Attacks relying on social engineering.
Attacks requiring physical access to a user's device.
Vulnerabilities only affecting users of outdated/unpatched browsers and platforms.
Clickjacking.
Pleo reserves the right to modify the list of out-of-scope vulnerabilities at any point in time.
Safe Harbor
Pleo supports safe harbor for security researchers who:
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our services.
Only interact with accounts you own or with explicit permission of the account holder. If you do encounter Personally Identifiable Information (PII) contact us immediately, do not proceed with access, and immediately purge any local information.
Provide us with a reasonable amount of time to resolve vulnerabilities prior to any disclosure to the public or a third-party.
We will consider activities conducted consistent with this policy to constitute "authorized" conduct and will not pursue civil action or initiate a complaint to law enforcement. We will help to the extent we can if legal action is initiated by a third party against you.
Please submit a report to us before engaging in conduct that may be inconsistent with or unaddressed by this policy.
Domains
pleo.io
app.pleo.io
api.pleo.io
auth.pleo.io
backoffice.pleo.io