Disclosure Policy
Policy Guidelines
Responsible disclosure program guidelines, Submission format, Out of scope vulnerabilities
Knovatics believes that everybody should be safe and secure on the internet. Knovatics is committed to maintaining the security of our assets, systems, and customers’ information. If any potential vulnerabilities are identified in any product, system, or asset belonging to Knovatics, we encourage security researchers to contact us as soon as possible. If you believe you have identified a potential security vulnerability, please submit it in accordance with our Responsible Disclosure Program.
Thank you in advance for your submission. Knovatics does not operate a public bug bounty program and will not provide a reward or compensation in exchange for reporting potential issues.
Responsible disclosure program guidelines
Researchers shall ensure that when in the process of disclosing potential vulnerabilities they:
Do not engage in any activity that can cause potential or actual harm to Knovatics, Knovatics customers, or Knovatics employees.
Do not engage in any activity that can potentially or actually degrade Knovatics services or assets or cause them to stop entirely.
Do not engage in any activity that violates (a) applicable laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) the researcher is conducting research activity
Do not engage in any activity that puts Knovatics in violation of any (a) applicable laws or regulations or (b) the laws or regulations of any country where (i) data, assets or systems reside, (ii) data traffic is routed or (iii) the researcher is conducting research activity.
Do not store, share, compromise or destroy Knovatics or any customer data. If any Personal Information is identified, you should immediately stop the activity, remove related data from your system, and immediately contact Knovatics. This is important for protecting any potentially vulnerable data, and you.
Do not initiate a fraudulent financial transaction.
Do not disclose any reported issues to third parties, or publish such reported issues publicly
By acting in accordance with the guidelines above and responsibly submitting your findings to Knovatics, Knovatics agrees not to pursue legal action against you unless it is compelled to do so by a regulatory authority, other third party, or applicable laws
Once a report is submitted, Knovatics commits to provide prompt acknowledgement of receipt of all reports (in any event, within 5 business days ofsubmission). Where possible, Knovatics shall use commercially reasonable endeavors to keep you reasonably informed of the status of any validated vulnerability that you report through this program.
Submission format
When reporting a potential vulnerability, please include a detailed summary of the vulnerability. This shall include the following:
The target
The steps
The tools
The artifacts
You may include screen captures to illustrate detail.
Out of scope vulnerabilities
Certain vulnerabilities are considered out of scope for our Responsible Disclosure Program. Out-of-scope vulnerabilities include, but are not limited to:
Physical testing of premises
Social engineering. For example, attempts to steal cookies, fake login pages to collect credentials
Phishing
Denial of service attacks
Resource Exhaustion Attacks