feat(marketing): add security bug bounty policy (#29)

This commit is contained in:
hampus-fluxer
2026-01-05 14:28:04 +01:00
committed by GitHub
parent 81402413f1
commit a9da71c7d7
48 changed files with 902 additions and 343 deletions

View File

@@ -26,7 +26,7 @@ Hampus Kraft, Founder & CEO
- **General Inquiries:** support@fluxer.app
- **Press & Media:** press@fluxer.app
- **Privacy & Data Protection:** privacy@fluxer.app (primary contact for privacy and data protection questions; we have not formally appointed a Data Protection Officer under GDPR)
- **Security Vulnerabilities:** security@fluxer.app
- **Security Vulnerabilities:** See our [Security Bug Bounty page](/security) for disclosure guidance and contact information.
- **Copyright (DMCA):** dmca@fluxer.app
- **Trust & Safety:** safety@fluxer.app
- **Legal Requests:** legal@fluxer.app

View File

@@ -35,4 +35,4 @@ Email support@fluxer.app with the filled template. A concise subject, such as `B
## Security issues
If you believe the issue is security-related, email security@fluxer.app instead of Support. Include clear steps, why you think it is a security risk, and any impact you see. We respond quickly to assess, coordinate a fix, and discuss disclosure expectations.
If you believe the issue is security-related, visit our [Security Bug Bounty page](/security) instead of emailing Support. Follow the guidance there, include clear steps, why you think it is a security risk, and any impact you see. We respond quickly to assess, coordinate a fix, and discuss disclosure expectations.

View File

@@ -383,7 +383,7 @@ No online service can guarantee perfect security. We work continuously to improv
If you discover a potential security vulnerability or issue:
- Please report it to security@fluxer.app with enough detail for us to reproduce and understand the issue.
- Visit our [Security Bug Bounty page](/security) and follow the reporting instructions there so we have enough detail to reproduce the issue.
- Do not publicly disclose the vulnerability before we have had a reasonable opportunity to investigate and address it.
- We appreciate responsible disclosure and may acknowledge your contribution if you wish (subject to your consent).

View File

@@ -0,0 +1,118 @@
If you believe you have found a security vulnerability in Fluxer, please report it responsibly. This policy explains what is in scope, how to submit a report, what we need from you, and what you can expect from us.
## Safe harbor
If you follow this policy, act in good faith, and avoid privacy violations or service disruption, Fluxer will not pursue legal action against you for your security research.
## Table of contents
- [Who should read this](#who-should-read-this)
- [Scope](#scope)
- [In scope](#in-scope)
- [Out of scope](#out-of-scope)
- [How to report](#how-to-report)
- [What we need from you](#what-we-need-from-you)
- [Rewards and recognition](#rewards-and-recognition)
- [What to expect from us](#what-to-expect-from-us)
- [Safe testing rules](#safe-testing-rules)
## Who should read this
Security researchers, community members, and anyone who discovers a potential security issue in Fluxer should read this policy before sending a report. It explains what is in scope, how we triage findings, and how we acknowledge and reward responsible disclosures.
## Scope
### In scope
Fluxer websites, applications, and services operated by Fluxer Platform AB, including the domains below:
| In-scope domains |
| -------------------------------------------------- |
| `fluxer.gg`, `*.fluxer.gg` |
| `fluxer.gift`, `*.fluxer.gift` |
| `fluxerapp.com`, `*.fluxerapp.com` |
| `fluxer.dev`, `*.fluxer.dev` |
| `fluxerusercontent.com`, `*.fluxerusercontent.com` |
| `fluxerstatic.com`, `*.fluxerstatic.com` |
| `fluxer.media`, `*.fluxer.media` |
| `fluxer.app`, `*.fluxer.app` |
Also in scope:
- Infrastructure, systems, and operational services directly managed by Fluxer that impact authentication, authorization, payments, community data, or the processing of security- or privacy-relevant data (including user identifiers, account metadata, logs, analytics, telemetry, and similar signals).
- Abuse cases that enable unauthorized persistence, privilege escalation, or data disclosure when triggered through officially supported product features.
- Self-hosted Fluxer instances that declare trust in Fluxer security guidance, provided:
- the issue is reproducible on the latest official release as we ship it, and
- the issue is not solely caused by third-party modifications or local misconfiguration.
If you are unsure whether a target is in scope, email us and ask.
### Out of scope
The following are out of scope (not an exhaustive list):
- Third-party services, infrastructure, or integrations we do not control (for example partner communities' independent integrations, bots, or external hosting providers).
- Vulnerabilities that require physical access to facilities, servers, or devices.
- Social engineering, phishing, bribery, coercion, or attempts to manipulate Fluxer staff or users.
- Denial-of-service (DoS) attacks, traffic flooding, rate-limit exhaustion, or resource exhaustion testing.
- Automated scanning or bulk testing that produces noisy/low-signal findings, especially without a clear security impact and a reliable reproduction path.
- General UI bugs, feature requests, or non-security support issues (email support@fluxer.app for those).
- Issues in forked, modified, or outdated self-hosted deployments that are not reproducible on the latest official release.
In addition, we generally do not prioritize low-impact reports (for example missing best-practice headers or minor configuration issues) unless you can demonstrate a concrete security impact.
## How to report
Email your report to security@fluxer.ap.
Please include:
- A short, descriptive title.
- Why the issue is a security concern (impact, affected users/systems, and realistic attack scenario).
- Step-by-step reproduction instructions and any proof of concept (screenshots, logs, recordings, or curl commands are helpful).
Please do not publicly disclose the vulnerability until we have acknowledged your report and had a reasonable opportunity to investigate and ship a fix. We may coordinate a disclosure timeline with you.
## What we need from you
To help us validate and fix the issue quickly, include as much of the following as you can:
- A clear summary of the issue and its impact.
- Step-by-step reproduction instructions.
- The environment you used (browser, operating system, client version, region, logged-in state, etc.).
- Any mitigations you tried, and whether the issue persists after clearing caches, using a private window, or restarting clients.
- A severity estimate (for example a CVSS score), or a plain-language assessment of the access/impact the issue enables.
## Rewards and recognition
Depending on validity, severity, and impact, we may award:
- A Bug Hunter badge on your Fluxer profile.
- Plutonium gift codes on fluxer.app so you can access premium features.
Higher-severity findings receive more recognition. We intend to add cash payouts in the future once our payments tooling is ready. At this time, we do not guarantee monetary rewards, but we do credit valid research that follows this policy.
### Credit and eligibility
- Please report findings privately to security@fluxer.app.
- Public disclosure before we acknowledge and address the issue may make the report ineligible for rewards or recognition.
- If multiple reports describe the same underlying issue, we typically credit the first report that clearly explains the vulnerability and enables reliable reproduction.
## What to expect from us
- **Acknowledgement:** We aim to acknowledge reports within five business days (often sooner).
- **Triage and updates:** We will review your report, prioritize critical issues, and keep you updated as we investigate.
- **Resolution and disclosure:** After a fix is available, we typically coordinate disclosure and credit with the reporter, unless you prefer to remain anonymous.
- **If we cannot reproduce:** We will share what we tried and may ask for additional details, environment information, or a clearer proof of concept.
## Safe testing rules
- Only test against accounts, communities, and data you own or have explicit permission to use.
- Community-level testing (roles, permissions, invites, moderation tools, settings, data access, etc.) must be performed only in communities you own/admin, or where you have explicit permission from the community owner/admin.
- Do not access, modify, or attempt to view other users' or other communities' data without consent.
- Do not use automated flooding, scraping, brute forcing, or other disruptive techniques.
- Do not use scanners or automated tools in ways that degrade reliability or create noisy/low-signal reports.
- If your testing could trigger real user notifications, support workflows, emails, billing events, or payments, contact us first so we can monitor.
- Follow applicable laws where you live and where the systems operate. If you are unsure, err on the side of caution and ask before escalating a high-impact test.
Thank you for helping keep Fluxer secure.