Security Bug Bounty

classic Classic list List threaded Threaded
1 message Options
Threaded
Open this post in threaded view
|  
Report Content as Inappropriate

Security Bug Bounty

Remi Gacogne-2
Hi all,

Two months ago, we started working with HackerOne to set up a security
bug bounty program for our products, because we believe that no
technology is perfect and that working with skilled security researchers
across the globe is crucial in identifying weaknesses.

This bug bounty program is currently invitation-only, though we plan to
make it public very soon. Meanwhile, if you know highly skilled security
researchers interested in looking for issues in our DNS-related
software, written in C++, you can ask them to contact me so that I can
invite them into the program.

The scope of this program covers security issues in:

 * PowerDNS Authoritative Server
 * PowerDNS Recursive Server
 * dnsdist

Please note that our websites and infrastructures are in no way part of
this program, and are explicitly out of scope.

Besides our respect and attribution, PowerDNS may provide rewards to
eligible reporters of qualifying vulnerabilities. Rewards include:

* PowerDNS-Branded Clothing (T-Shirts, Polo Shirts, Hoodies).
* Minimum reward of $100 USD for vulnerabilities we consider to be
serious but of low-impact, up to a maximum of $5000 USD for the most
severe vulnerabilities.

PowerDNS will determine in its discretion whether a reward should be
granted and the amount of the reward. In particular we may choose to pay
higher rewards for severe vulnerabilities or lower rewards for
vulnerabilities that are considered less severe.

A more complete policy is available at HackerOne once you are invited to
our program. Please read it carefully and respect it.


Best regards,

Remi


--
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/






_______________________________________________
Pdns-users mailing list
[hidden email]
https://mailman.powerdns.com/mailman/listinfo/pdns-users

signature.asc (465 bytes) Download Attachment
Loading...