We acknowledge the valuable role that independent security researchers play in security and, as a result, we encourage responsible reporting of any vulnerabilities that may be found in our site or applications. Sendy iscommitted to working with security researchers to verify and address any potential vulnerabilities that are reported to us in accordance with this responsible disclosure policy.
#Reporting a Potential Security Vulnerability#
For the security of our users and service, we ask that you do not share details of the suspected vulnerability publicly or with any third party.
Please report the details of any suspected or detected vulnerabilities with Sendy by sending an email to `security@sendyit.com` , including the following information:
- Your name
- Vulnerability details with information to allow us to efficiently reproduce your steps and validate the vulnerability.
#What We Are Looking For#
Cross-site Scripting (XSS)
Cross-site Request Forgery (CSRF)
Server-Side Request Forgery (SSRF)
Database Injections
Remote Code Execution Vulnerabilities (RCE)
XML External Entity Attacks (XXE)
Access Control Issues
Exposed Administrative Panels that don't require login credentials
Subdomain TakeOver vulnerabilities
Anything not listed but important
#What We Are Not Looking For#
Vulnerabilities requiring physical access to the victim's unlockeddevice
Denial of Service attacks
Brute Force attacks
Spam or Social Engineering techniques
Content Spoofing
Best practices concerns
Issues relating to Password Policy
Issues relating to token lifetime
User enumeration
Full-Path Disclosure on any property
CSRF-able actions that do not require authentication (or a session) to exploit
Version number information disclosure
Reports related to missing security headers
CSV Injection
Lack of rate limiting
Reverse Tabnabbing
Bugs that do not represent any security risk
Vulnerabilities that are limited to unsupported browsers
#Our Commitment to Security Researchers#
If you responsibly report a vulnerability in accordance with this policy, we will:
Promptly respond to acknowledge the receipt of your report.
Provide an estimated timeframe for addressing the vulnerability.
Notify you when the vulnerability has been remediated.