Home
Legal
Inbound Vulnerability Disclosure Policy

Terms & Policies

Learn more about Chainguard policies and our legal documents.

Chainguard Vulnerability Disclosure Policy


Introduction

The Chainguard Security Vulnerability Disclosure Policy (the “Policy”) is designed to foster an environment where security researchers are encouraged to disclose vulnerabilities and work with us to mitigate security vulnerabilities. We value the contributions of security researchers acting in good-faith to help us maintain a high standard for the security and privacy for our users. This includes encouraging responsible vulnerability research. This Policy describes the systems and types of research that we authorize researchers to use with respect to our software and services, provides guidelines on how to send us vulnerability reports, and summarizes what you can expect from us in return.


Expectations

Except for with regard to vulnerability types listed below under the subheading “Out of Scope Vulnerabilities”, when working with us and reporting a vulnerability in accordance with this Policy, you can expect us to:

  • Work with you to understand and validate your report, including a timely initial response to the submission;

  • Work to remediate discovered vulnerabilities in a timely manner; 

  • Recognize your contribution to improving our security if you are the first to report a unique vulnerability, and your report triggers a code or configuration change.


Scope: Software and Services

This Policy applies to the below listed software and services (the “Scope”). If you have questions about the Scope of this Policy, please contact security@chainguard.dev.

Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing only be conducted on the systems and services covered by the Scope of this document. If there is a particular system not in Scope that you think merits testing, please contact security@chainguard.dev to discuss it first. The Scope of this Policy is subject to change as our product offering changes.


Software


Scope

Services


Scope
  • *.chainguard.dev

  • *.cgr.dev

  • *.enforce.dev

  • *.wolfi.dev

  • *.chainreg.biz

  • *.enforce.health

  • *.chainops.health


Out of Scope


Domains Out of Scope

If a DNS Record is pointing to a third party SaaS provider, it's likely out of scope of our Vulnerability Disclosure Policy on the basis that it's pointing to a third party that we can't authorize testing against. Such as;

  • mail.chainguard.dev

  • gh-mail.chainguard.dev

  • auth.chainguard.dev

  • support.chainguard.dev

  • courses.chainguard.dev

  • [Please add all additional domains we can’t authorize testing against]


SaaS providers Chainguard host our infrastructure on have all offered explicit permission to allow testing of applications owned and operated by Chainguard:


Out of Scope Vulnerabilities

  • SSL/TLS version-related vulnerabilities

  • Self-XSS

  • CSRF for non-significant actions (e.g. logout, etc.)

  • Clickjacking attacks without a documented series of clicks that produce a vulnerability

  • Spam (including issues related to SPF/DKIM/DMARC)

  • Denial-of-service attacks or issues related to rate limiting

  • Missing HTTP headers, except as where their absence fails to mitigate an existing attack

  • Vulnerabilities discovered shortly after their public release unless you are the original author

  • Assumed vulnerabilities based upon version numbers only

  • "Scanner output" or scanner-generated reports without an analysis of that report in context

  • Non-technical attacks such as social engineering, phishing, or physical attacks against our employees, users, or infrastructure.


Vulnerability Types of Interest

For the Chainguard site we are particularly interested in research into the following areas:

  • Authentication bypass

  • Cross account manipulation

  • SQL injection or command injection

  • Local file inclusion or remote file inclusion

  • Stored or Reflected XSS


Guidelines

The below rules have been developed to encourage vulnerability research and to distinguish between legitimate research and malicious attacks. We ask that you comply with this Policy by adhering to the following guidelines:

  • Report any vulnerability you’ve discovered to us promptly and in accordance with this policy;

  • Avoid violating the privacy of others, disrupting our systems, destroying or manipulating data, and/or harming user experience;

  • Use only the Official Channels (as described below) to discuss vulnerability information with us;

  • Provide us with a reasonable amount of time to remedy the vulnerability before sharing the details of the vulnerability with the public, and in any event, avoid sharing any details of the vulnerability publicly until you have at least received an acknowledgment from us regarding the reported vulnerability;

  • Perform testing only on in Scope systems, and respect systems and activities which are out of Scope;

  • Only use exploits to the extent necessary to confirm a vulnerability’s presence. Do not use an exploit to compromise or exfiltrate data, establish persistent command line access, or use the exploit to pivot to other systems;

  • If a vulnerability provides you with access to non-public data, limit the amount of data you access to the minimum required to effectively demonstrate a proof of concept; and cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), credit card data, or proprietary information;

  • You should only interact with test accounts you own or that you access with explicit permission from the account holder;

  • You must not exploit the security vulnerability for your own gain; and

  • You must not engage in extortion.


§Safe Harbor

If you make a good faith effort to comply with this Policy, we will not pursue legal action against you with respect to your research conducted in compliance with this Policy. We consider research conducted in accordance with this Policy to be:

  • Authorized in view of any applicable anti-hacking laws (including by not limited to Computer Fraud and Abuse Act (CFAA) and/or similar state laws), and we will not initiate or pursue legal action against you for accidental, good faith violations of this Policy;

  • Authorized in view of relevant anti-circumvention laws, and we will not bring a claim against you for circumvention of technology controls;

  • Exempt from Digital Millennium Copyright Act (DMCA) with respect to the circumvention of the technological measures and controls we have used to protect our applications;

  • Exempt from any restrictions in our Terms of Use that would prohibit such research, and we waive those restrictions on a limited basis for research conducted in accordance with this Policy; and

  • Conducted in good faith.


You are expected, as always, to comply with all applicable laws.


We understand that many Chainguard systems and services are interconnected with third-party systems and services. While we have the ability to authorize your research on Chainguard’s Software and Services, we cannot authorize any research on third-party products. If legal action is initiated by a third party against you and you have complied with this Policy, we will take steps to make it known that your actions were conducted in compliance with this Policy.


If at any time you have concerns or are uncertain whether your security research is consistent with this Policy, please submit a report through one of our Official Channels before proceeding with such research.


Third Party Safe Harbor

If you submit a report in accordance with this Policy which affects a third party service we may be required or have an obligation to share certain information with the affected third party. For example, we may share non-identifying content from your report with an affected third party. Except as required by applicable law, we will not share your identifying information with any affected third party without first notifying you.

Please note that we cannot authorize out of Scope testing in the name of third parties, and such testing is beyond the Scope of our Policy. Please contact any third party either directly or through a legal representative, or refer to such third party’s vulnerability disclosure Policy before initiating any testing on that third party or their services. This is not, and should not be understood as, any agreement on our part to defend, indemnify, or otherwise protect you from any third party action based on your actions.


Official Channels

Please submit all security bug reports to security@chainguard.dev. The more details you provide, the easier it will be for us to triage and fix the issue.


Suggestions of useful information include:

  • Thorough description of the vulnerability.

  • Links to source code if the project is open source.

  • Proof of concept demonstrating the vulnerability.

  • A list of impacted endpoints or resources.