Skip to main content
Vulnerability Disclosure Program

Learn how to report security vulnerabilities to Intruder, and understand our responsible disclosure process for prompt resolution

Updated this week

At Intruder, we take the security of our systems and the protection of user data seriously. We understand that the security landscape is constantly evolving, and we rely on our community of security researchers to help us identify potential vulnerabilities. We encourage responsible disclosure of any security vulnerabilities, incidents, or concerns you may come across in our systems. This article provides you with all the necessary information to report vulnerabilities and explains the process we follow to handle them.


Reporting Vulnerabilities

If you discover a vulnerability in any of Intruder’s systems, applications, or services, we want to hear from you. To ensure vulnerabilities are handled securely and efficiently, we have set up a clear and direct process for reporting.

Where to Report

For security vulnerabilities, please report them via the following channel:

  • Security Mailbox: Send a report directly to [email protected]. This will automatically trigger an alert to our Security Team, who will begin the review process immediately.

For more details on how to submit your report securely, please visit Intruder’s security.txt page. This page outlines further steps for secure disclosure and provides information on how to submit reports safely.

For any general security incidents or non-vulnerability concerns, please use the following contact methods:

  • Live Chat: You can contact us via the chat bubble located in the bottom right of our website.

  • Email: You can also email us at [email protected] for any questions, concerns, or support requests that are not related to vulnerabilities.

The Process for Reporting Vulnerabilities

Once we receive your vulnerability report, we begin our process to assess, address, and resolve the issue. Here’s how it works:

  1. Initial Acknowledgment and Triage:

    When we receive your report, it is automatically logged and acknowledged by our Security Team. A member of the team will assess the report’s completeness and verify the vulnerability’s validity. If further information is required, we may reach out to you for clarification.

  2. Security Team Review:

    Our Security Team reviews the reported vulnerability in detail. During this stage, the team evaluates the severity of the issue, considering factors such as the potential impact on user data, the integrity of our systems, and the availability of services. We also analyze the potential risk to the confidentiality of sensitive data.

  3. Vulnerability Triage:

    Once the vulnerability is verified, it undergoes triage. Our Security Team works with relevant internal teams to determine whether the vulnerability is critical, high, medium, or low severity. We also assess whether this vulnerability could be exploited in the real world.

  4. Escalation to Development Team:

    Vulnerabilities that are classified as high or critical severity are escalated to our Development Team immediately. A ticket is created in our internal tracking system, detailing the issue, its potential impact, and the steps necessary to resolve it. These issues are treated with the utmost priority.

  5. Resolution and Fix Implementation:

    Our Development Team works to implement a fix for the reported vulnerability. This could involve code changes, configuration updates, or infrastructure improvements. Once a patch or fix has been developed, it is thoroughly tested to ensure it effectively mitigates the risk without introducing new issues.

  6. Communication with the Reporter:

    Once the vulnerability has been fixed and the solution has been deployed, we will inform you, the reporter, about the resolution. We will provide details about the steps we have taken to address the issue, including any patches or changes made to the system.

  7. Public Disclosure:

    Depending on the nature and impact of the vulnerability, we may make a public disclosure once it has been resolved. We believe in responsible disclosure and will work with you to ensure that any public communication is handled appropriately to minimize the risk to users.

Reporting Security Issues, Incidents, and Other Concerns

While vulnerabilities should be reported through [email protected], we also encourage you to report any other security incidents, concerns, or related issues, including but not limited to:

  • Security breaches or incidents that may indicate a compromise of confidentiality, integrity, or availability.

  • Concerns about system performance or availability that could lead to security risks.

  • Mistakes or potential misconfigurations that could affect the security of our infrastructure or services.

These types of issues should be reported as follows:

  • Live Chat: You can reach out to us via the chat bubble located in the bottom right of our website.

  • Email: If you prefer, email us directly at [email protected] for general inquiries, support, or to report concerns not related to vulnerabilities.


Responsible Disclosure and Confidentiality

At Intruder, we are committed to responsible disclosure practices. This means that until a vulnerability has been fully fixed and patched, we ask that you do not publicly disclose any details of the vulnerability. Premature public disclosure can expose systems to unnecessary risk, which we strive to minimize.

By working with us directly, you help ensure that the vulnerability is addressed in a secure manner, allowing us to notify affected users and deploy fixes without exposing our systems to further risks.

If you are unsure about the disclosure process or how to handle any information regarding the vulnerability, feel free to reach out to us. We are happy to collaborate with you to ensure the responsible handling of the issue.


Conclusion

Intruder’s Vulnerability Disclosure Program is part of our ongoing commitment to securing our services and protecting our users. By following the steps outlined in this document, you help us maintain the highest security standards and contribute to a safer internet for everyone.

For security vulnerabilities, use [email protected]. For other inquiries or concerns, reach out to us through the chat bubble in the bottom right of our site or by emailing [email protected].

Thank you for helping us ensure the security of Intruder’s services!

Did this answer your question?