Introduction
This policy aims to define a process by which security researchers can collaborate with Cybersikker.dk to improve the security of our products and services. At Cybersikker.dk, we take security and the trust of our users very seriously. The responsible disclosure of security vulnerabilities helps us ensure the security and privacy of our users. We are committed to thoroughly investigating and resolving security issues in our platforms and services.
Please read this document fully before reporting any vulnerabilities to ensure that you understandthe policy and can comply with it.
In Scope
This disclosure policy applies only to vulnerabilities in Cybersikker.dk products and services under the following conditions:
Out of Scope
Any services hosted by third-party providers and services are excluded from scope. In the interest of the safety of our users, staff, the Internet at large, and you as a security researcher, the following test types are excluded from scope:
Bug Bounties
Cybersikker.dk does not have a bug bounty/reward program and will not offer paid rewards for discovered vulnerabilities. However, we do offer our greatest thanks and appreciation to security researchers who take the time and effort to investigate and report security vulnerabilities to us.
Reporting a Vulnerability
If you have discovered an issue which you believe is an in-scope security vulnerability (please see the section above for more details on scope), please use the details in security.txt or email security@cybersikker.dk including:
Mandatory Rules / Guidelines
Security researchers must not:
We request that any and all data retrieved during research be securely deleted as soon as it is no longer required and at most, 1 month after the vulnerability is resolved, whichever occurs soonest.
If you are unsure at any stage whether the actions you are thinking of taking are acceptable, please contact our security team for guidance (please do not include any sensitive information in the initial communications): security@cybersikker.dk.
What to Expect
In response to your initial email to security@cybersikker.dk, you will receive an acknowledgment reply email from the Cybersikker.dk Security Team. The acknowledgment email will include a ticket reference number which you can quote in any further communications with our Cybersikker.dk Security Team. Attached to the acknowledgment email will be a PGP key which you can use to encrypt future communications containing sensitive information.
Following the initial contact, our Security Team will work to remediate the reported vulnerability and will respond to you as soon as possible to confirm whether further information is required and/or whether the vulnerability qualifies as per the above scope or is a duplicate report. From this point, necessary remediation work will be assigned to the appropriate Cybersikker.dk teams and/or suppliers. Priority for bug fixes and/or mitigations will be assigned based on the severity of impact and complexity of exploitation. Vulnerability reports may take some time to remediate and/or remediate, and you're welcome to inquire about the status of the process.
Our Security Team will notify you when the reported vulnerability is resolved (or remediation work is scheduled) and will ask you to confirm that the solution adequately addresses the vulnerability. We will offer you the opportunity to provide feedback on the process and relationship, as well as the vulnerability resolution. This information will be used in strict confidence to help us improve the way we handle reports and/or develop services and resolve vulnerabilities. We will also offer to include reporters of qualifying vulnerabilities on our acknowledgments page and will ask for the details you wish to be included.
Legal Matters
This policy is designed to be compatible with common good practices among well-intentioned security researchers. It does not give you permission to act in any manner that is inconsistent with any law or cause Cybersikker.dk to be in breach of any of its legal obligations.