Testsigma

Products

Solutions

DocsPricing

Resources

bg-pattern

Testsigma Vulnerability Disclosure Program

Quick Overview

Testsigma aims to improve product security through responsible testing and submission of previously unknown vulnerabilities. We′re extremely grateful for security researchers and users who report vulnerabilities to the Testsigma team. Our team thoroughly investigates all reports.

We do not currently have a bug bounty program. However, if you think you′ve spotted a bug in our system, let us know, and we′ll include you in our wall of fame for your eagle-eyed efforts.

  • To report a potential vulnerability, please email us at security@testsigma.com
  • The responsible disclosure of security vulnerabilities helps us build a secure application for the entire community and ensure all our user′s security and privacy.

In Scope Testing

All bug testing must be done only on In Scope Targets. Please refer to the details in theOut of Scopesection before proceeding.

  • In principle, the Testsigma web service that handles reasonably sensitive user data is intended to be in scope. This includes virtually all the content in the following domains: *.testsigma.com

Reporting Guidelines

To participate in our vulnerability reporting program, please follow these guidelines:

  • Only submit original, previously unreported vulnerabilities.
  • Description and potential impact of the vulnerability.
  • A detailed description of the steps required to reproduce the vulnerability; and, where available, a video POC.
  • Do not attempt to access or modify any data that does not belong to you.
  • Please do not attempt to disrupt the operation of our systems or services.
  • Do not publicly disclose the vulnerability without prior approval from us.

Policy

  • Reach out to security@testsigma.com if you have found any potential vulnerability in our products meeting the criteria mentioned in the policy below.
  • You can expect an acknowledgment from our security team within 24 hours of submission.
  • The Testsigma team will define the severity of the issue based on the impact and the ease of exploitation.
  • We may take 3 to 5 days to validate the reported issue.
  • Actions will be initiated to fix the vulnerability in accordance with our commitment to security and privacy. We will notify you when the issue is resolved.

Qualifying Vulnerabilities

Below is the list of vulnerability categories that will be considered qualified vulnerabilities and will get prioritized and fixed.

1HTML Injection
2Cross-Site Scripting (XSS)
3CSV Injection
4Open Redirection
5Client Side Controls
6Securing Cookies
7SQL Injection & Sensitive Information Disclosure
8Cross Site Request Forgery
9Broken Access Control
10CORS Misconfiguration

Non-Qualifying Vulnerabilities

The below list of vulnerability categories will be considered as out of scope,

1Self-XSS
2Host header and banner grabbing issues
3Automated tool scan reports.Example: Web, SSL/TLS scan, Nmap scan results, etc.
4Missing HTTP security headers and cookie flags on insensitive cookies
5Rate limiting, brute force attack
6Login/logout CSRF
7Session timeout
8Unrestricted file upload
9Open redirections
10Formula/CSV Injection
11Denial of Service (DoS)/Distributed Denial of Service (DDoS)
12Vulnerabilities that require physical access to the victim machine.
13User enumeration such as User email, User ID, etc.
14Phishing / Spam (including issues related to SPF/DKIM/DMARC)
15Vulnerabilities found in third-party services
16EXIF data not stripped on images

Hall of Fame

While we won't be able to shower you with riches for finding and disclosing vulnerabilities to us, we can offer you something just as valuable: a spot in our hall of fame. Testsigma truly appreciates your legendary efforts.

We would like to recognise the efforts of the following individuals for their contribution to our responsible disclosure program. Please accept our sincerest gratitude to every one of you.

Hall of Fame for

Thank you!

For your contribution.

We look forward to working with you to keep our systems secure.