Jun 7, 2021
At OctoML, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present.
If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. We would like to ask you to help us better protect our clients and our systems.
This policy applies only to the domains
*.octoml.ai. Any other services, such as any connected services, are excluded from scope and are not authorized for testing.
Please do the following:
E-mail your findings to email@example.com. Optionally, encrypt your findings using our PGP key (see below) to prevent this critical information from falling into the wrong hands,
Do not take advantage of the vulnerability or problem you have discovered, for example by downloading more data than necessary to demonstrate the vulnerability or deleting or modifying other people's data,
Do not reveal the problem to others until it has been resolved,
Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties, and Do provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. Usually, the IP address or the URL of the affected system and a description of the vulnerability will be sufficient, but complex vulnerabilities may require further explanation,
Do not submit a high volume of low-quality reports.
What we promise:
We will respond to your report within 3 business days with our evaluation of the report and an expected resolution date,
If you have followed the instructions above, we will not take any legal action against you in regard to the report,
We will handle your report with strict confidentiality, and not pass on your personal details to third parties without your permission,
We will keep you informed of the progress towards resolving the problem,
In the public information concerning the problem reported, we will give your name as the discoverer of the problem (unless you desire otherwise), and
As a token of our gratitude for your assistance, we offer a bug bounty for every report of a significant security problem that was not yet known to us.
We strive to resolve all problems as quickly as possible, and we would like to play an active role in the ultimate publication on the problem after it is resolved.
The following is a partial list of issues that we ask for you not to report, unless you believe there is an actual vulnerability:
Publicly accessible Jenkins servers
CSRF on forms that are available to anonymous users
Disclosure of known public files or directories (e.g. robots.txt)
Domain Name System Security Extensions (DNSSEC) configuration suggestions
Banner disclosure on common/public services
HTTP/HTTPS/SSL/TLS security header configuration suggestions
Lack of Secure/HTTPOnly flags on non-sensitive cookies
Logout Cross-Site Request Forgery (logout CSRF)
Phishing or Social Engineering Techniques
Presence of application or web browser 'autocomplete' or 'save password' functionality
Sender Policy Framework (SPF) configuration suggestions
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGC4EOUBEAC8esBxqefESlehtAlzzpN1VLSDUgJW/ElJMvTx4whL41KUpds9 ArlOsX0uRnBD4/brhmRHm0ZXvNuXlRSf6OjpWw0+/ijR7Bcoxm3bVHVOf+Qjq0Ld effAtb0V8kVF+9KH6i2ToUZ7kkRiU0a5Wz955gIxMjDjnZE4FOTSo6cnpM443tZL dNeBWUUPc6tPSiGawUt7EvS7HA8aPoguAx9yj4RTe9KpbLv30h9Il7LnO6m9Li1I r9rt8QsZPOKgSwg0eftt+jvk/r4WJSCaaToIaw4vonwUzNOnuCxGMYAz/hqeWT6z qRUc2Za+XI8XEZTr0vVHTuQ4vw4T58VIOQERg0nzuREWqRcZRVjFeJNMjHOQ+Ntc fqfELeD5vAi/B3Taa04nZA3/yAQvmoTNd4ESbUtWTOfW9+ojuY2xxudH3E+8klA5 XsZoUthUWOkTjX2DeLqYgHJiEMEia3Kkt4PLj49/np2BecoYbwIEebDWK/9rh6TW n8tcK6z6IbkCYNkUO4exWosYtDWDUr1+Ap0nfPTF44pM9aZHA8t+0P+rwfCjKDDO 90XkVVpz8varm8hCgj/AdFhGiNaUWbkCG185xuNMCoGw2Qbd2wNLSyXLViBMZjp3 +nVDE9adQpPX6CntwT8QlkV/JVc2AjYQjHDhQmq97vhC0v2TXTw0HMraqQARAQAB tCRPY3RvTUwgU2VjdXJpdHkgPHNlY3VyaXR5QG9jdG9tbC5haT6JAlQEEwEIAD4W IQSFZCNmigL9NwLhk3GB05BCHHqZZwUCYLgQ5QIbAwUJCWYBgAULCQgHAgYVCgkI CwIEFgIDAQIeAQIXgAAKCRCB05BCHHqZZ32SEACr5YKbxe8y1MJC53MtZxugAgnC jf4zXSv52gC//Lk1ZdYhhxxdp/lkNARZJMKcwxKh2KNFXdjZcB4eekcGAl0AxFrw Awh2EPHeT96ghp46cahm7Ue+X743rw7ySQiEn7G3tRen5UnffitiP3BRr/A2meZE 7qQMvZRrQqKJKezMyXZI3Y/ks0fPglkTsPYxvF9ZUgfbEG+Gyz28TYmOAbeoYrAN fR5AGL58Z5Iz7QPaAaM2ioOCeK7hhgMaz4Go4tq4agqsSjhAEXXpHlrD5Ir938jN VfUEGVLEDapReDAeOnbNx660zN3WTpbecSbXOLfqaa8tyXyHkP+ctRj/7TLhI2QB 1ovHvTVmRbLDbOLGnEGOiBt4JvhiRCblpkPEAkiGav1aVwzm2KDd14uvlaQf13B8 /8w/S//cQlWa7go5fudxT4l1PYjgujVI49kNp88t/rRDZhiGsTAygM6v8u4jEZJ2 AA51W2j7q7BQ2QtKmc8CpJLO/ZSh0LEUisIYzgPgnfdNYFGjjNDjhLdI9clPUtvq n0mLmEaQetu+v+rokjn/zaLuSeh9PaMd0N/Oyi1rnIZ48at5Pv5/RxI+JSSIBytO TqiMexXD6IDl9Jf7N8vrFzmxEAIc0audn1OXP1qFbc49xfl7eNQ6PkLch2mWYuq+ ocRG93xkqvRJJzi8LLkCDQRguBDlARAAx88RhU2o8W+hlg62PwAfHyTegd2/QA2c HkJNGwmxmPmI5Df1qiclHxV41k5w0cMp5Hxwsb5viO12g9RH/89uN2dQp1+aUkBm thKlk5TIoPzK0CfXhEfr2NTDtA1nWGulpXrqY3KgEnq+6rGOxcQWo0ZblDrKF/nz yUZomkAPEW1C74+6qETdwztzGqiu4OalGcQmS2Y5oFNmxiNwUbkNKL3HGNkb6Tly MycRMsiEAvVrvIQsTIsygGjc/ZazAj+ifC/YvIcZ1opaT+J3yVHQNSKeiueImWNl rf9/MONax2LCciutMngk+c8tiyq6ufEZaep+QDZ7F1TTfiLQS+aki7s988sxToki v8ysewB4WsSvcWAqi1R56l9/BkCjpjwnJ9WX6oMvBw3Ktg7yHuqXlbkGaByuNkFV YRT0TsgHydB/I0VRBcXLenwlVXkwxzu1/GxNHEpZo6BJ/Bt2CaVlBfDG4N7MQGHQ JtCQLp6WN+W4jE4kPqTmfTQKw34p8s4lTmX2FCMFKyGaL8xzDty9nIRArUWiwyjX FG0zu0RqQvWcKNBhbT8WgTMOodnUWGsUzsj6TZf7H9FPx1LvOa9BPpBh2uQZE855 HU3iCnIIXYpPFh19tbj2EWvRtWUDCYmFvRqcC3w81c7GpoFQUSRuWe8cPpDURChR PiV0Sqnfcv0AEQEAAYkCPAQYAQgAJhYhBIVkI2aKAv03AuGTcYHTkEIceplnBQJg uBDlAhsMBQkJZgGAAAoJEIHTkEIcepln+EoP/AvRxL5oOaL9Z+IAdumcHEwcOfoH lxUha/Tt3HrnCk9yfovBZFtGm8p49HWrwy5Nup8EQlRQAkr1Vv+M4R4nG8li2fvG 0cmlRXETQzIBJ53HI1boAMEOFzaNRr1Y0rZKmd2alFdF6dGJYk7Rh9Ne1MZuZuFq osDzzw3AkHklHXp6U4iGFcjeqvNZ8CAQGu8Kgk/ZzTPnCB5q1JHZIj9Tm3t8Lues NBw2qkDtWrStXqwODZ/0zOuIYdI+DqtUEz18ee+rqsvAkfJy1Sjaziqz3JzfvM5L N2bnoWc/bsoHLTI4jYgnTlenomvXwEXXr275D6XV0yXKidRT4YiDVa5mic23EoiL pIBiLKIJIdt6ylRQkpGIaU/tBBJp5cqxB1jSx7thb8dHEXo1BMkJa0kT8zcBzCAy ELKlsZCP3/AEkXe6cqiFMZC42XidBjRSLr0gDCswcmqqZ9fQnxgcVW4KkokmGXgt FsxZXKL8krH9Zcl9dkffYTOB0BlY+psWvvnbmIODqfN7kl6/xHpoXlZUo+Vu/cfe Zqk+1ZMQLCp3Uf3+78+hz7eeHlJTtPn+A3xAXqyO0dF6t6twoC0JvQBgRmQhYPGH 1uDuAXWdyzP/Pn9J/aLmJy7agI6jOainpYPeiEPXgH6TPUigq+/IXXovi3ZNmwBJ 5zgHxHdBrpanqFSX =QBdp -----END PGP PUBLIC KEY BLOCK-----