Responsible Disclosure Policy
Announcement
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Dear valued researchers, Starting from 26th July 2024, we will be taking a break and will not be accepting any new submissions during this period. We deeply appreciate your understanding and patience during this uncertain time. We look forward to resuming our work and engaging with your valuable submissions as soon as we are able. Thanks for your understanding and ongoing support! Best, dw1 -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEDmLnOJC65PyD9kOJvZx+0YqeUHgFAmaXPk 8ACgkQvZx+0YqeUHhrEg//ePRj3oNY6+CUwiff2rfiuH0JRDy/ qT876L6tjeadF/j59SpZyqSVfH+cDTuMigQ/r1MYBnmcCo0oLZ Q13R4CcQG+eXDwe6yfttcZgARkpVQ8IhuL6v3NWqo0qP0uvC2M bOr+WpXcfPgFS3NE+/djFPjgoSMhY9vmDezJ81H1+UKtNWVyHy U3mA2vYOKUDkSOS7ngUqdB8Q7lGOkiEUWudpxwj83ZxcjXpBnh LQqzfB5kVsSNCsCgVWaPAAqbE34j1qJEF/ToTrMyaVTopHjnhu JT2k3p69b+U5qtk1/+1faTurFKqhqIJhWi3LN8NgHJCkRCxXqM S6wBeoKx15tFaYO1zibnZckCdirT0JUXtZRg2KUWHqA4Ug7CgD +BE0igz76qzcXzFez+JZduDNdeH2RqdhvP9yXLnoaVK9tKL09H tARvsZJATUlLbRsN2FydIJXsIDhjakegjngREJ23MJ+/MQQlQt 2+4IYmF1gQes6MLFhuB8K+K5mG5lC/zkUD4kPGCBKxeqBtfT+k VByR/R+O16elFaHAqldnUBbG9k2NM1Ndl6JzW2krJY0YrneYv1 ZERJK6CIyRMXU8Uo7ZswK75njD9xpGgbPpERhxOgZgIKR7InLH cjf7t14B23tBbTsWjeyq9e47KMQmpLfTg7cET7sn1vcPYG/zEN KBig==5xKY -----END PGP SIGNATURE-----
Introduction
Kitabisa.com welcomes feedback from security researchers and the general public to help improve our security. If you believe you have discovered a vulnerability, privacy issue, exposed data, or other security issues in any of our assets, we want to hear from you. This policy outlines steps for reporting vulnerabilities to us, what we expect, what you can expect from us.
Systems in Scope
-
kitabisa.com
-
accounts.kitabisa.com
-
core.kitabisa.com
-
donasi.kitabisa.com
-
galangdana.kitabisa.com
-
galang-dana.kitabisa.com
-
geni.kitabisa.com
-
waf.teler.app
Out of Scopes
-
*.kitabisa.com
-
blog.kitabisa.com
-
*docs.kitabisa.com
-
imgix.kitabisa.com
-
maintenance.kitabisa.com
-
static*.kitabisa.com
-
*.ktbs.dev
-
*.ktbs.in
-
*.ktbs.io
-
*.kitabisa.cc
-
*.kitabisa.org
- Assets and/or other equipment not owned by parties participating in this policy.
Testing is only authorized on the targets listed as in scope. Any domain/property of Kitabisa not listed in the targets section is out of scope. This includes any/all subdomains not listed above. Vulnerabilities discovered or suspected in out-of-scope systems should be reported to the appropriate vendor or applicable authority. If you think it demonstrably belongs to Kitabisa, use Official Channels to discuss with us.
Our Commitments
When working with us, according to this policy, you can expect us to:
-
Respond to your report promptly, and work with you to understand and validate your report;
-
Strive to keep you informed about the progress of a vulnerability as it is processed;
-
Work to remediate discovered vulnerabilities in a timely manner, within our operational constraints; and
-
Extend Safe Harbor for your vulnerability research that is related to this policy.
Our Expectations
In participating in our vulnerability disclosure program in good faith, we ask that you:
-
Play by the rules, including following this policy and any other relevant agreements. If there is any inconsistency between this policy and any other applicable terms, the terms of this policy will prevail;
-
Report any vulnerability you’ve discovered promptly;
-
Avoid violating the privacy of others, disrupting our systems, destroying data, and/or harming user experience;
-
Limit the duration of the fundraising campaign to 1 day during testing;
-
Use only the Official Channels to discuss vulnerability information with us;
-
Provide us a reasonable amount of time to resolve the issue before you disclose it publicly;
-
Perform testing only on in-scope systems, and respect systems and activities which are out-of-scope;
-
If a vulnerability provides unintended access to data; Limit the amount of data you access to the minimum required for effectively demonstrating a Proof of Concept; and cease testing and submit a report immediately if you encounter any user data during testing, such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI), credit card data, or proprietary information;
-
You should only interact with test accounts you own or with explicit permission from the account holder; and
-
Do not engage in extortion.
Official Channels
Please report security issues via [email protected], providing all relevant information. The more details you provide, the easier it will be for us to triage and fix the issue.
The Kitabisa security team recommends to use this PGP key to sign all security notifications and encourages others to use this key when sending sensitive information to us.
PGP fingerprint: 0E62 E738 90BA E4FC 83F6 4389 BD9C 7ED1 8A9E 5078
-----BEGIN PGP PUBLIC KEY BLOCK----- mQINBGWB+XgBEADmlKP2xoJGwq+3Y9R/IIbcn1g2yhFfevBIYEtDdZ4GFaCeKqcF H516NzAd3l2S63+of5c7pvCuWsL6xAMZAEoo3+z/gOEPPh4G82FFuJpd70tP/sgK fZiU4WdMCeBdDDEer4vsk2utNc6Mm1rCISbQC8CMa+KmSBKjcbjc1LXjdHw1UAGv SOBe9IxNvg71AFRxZM4BoVjSh6IKlOpMC3bpBs78FNpxxtnj2VDTrgE2dD7Rn+rg JQd+CurBH6fWO45PvfOKd9rQj5EqXulOyCIMP5e+TMJs1nGDAYps6o5f7oPUzU5c oAmpcWilzonrHqLXq1NS9qIjxJ+1h3MWXsfkPAlG9fQ7mVogr44LUGUOimFDN2Jp 3FAFcSdId8LaH2HdteYe/4aXyjftSnvoU8DZ+QJrOMm7s1wZKlTZixEB1gHOdvYI +OyDnrJkRkYkptTH3DlFcy2lA3qD12x5zOItRxXexVChnVOPs7zFuG2HliRpsPVg KxATa9wLra0P8oyaewkgb/Euq5p6R8cXzIF0ikpS2zsLO7aCTPCQTYIdrWCssGYh wrwjmm/2EJ+HexpJKBUgoK/u7zI7R1ilOBFUywiLX/zvUJeT69yGO6DAQDh9ScNC ExhGkWuh+kMNcuouad7ImIDdz4LUWSQ0ywJvJ+VtmmEP7B7eF1t2CoiULQARAQAB tFFLaXRhYmlzYSBTZWN1cml0eSAoT2ZmaWNhbCBSZXNwb25zaWJsZSBEaXNjbG9z dXJlIENoYW5uZWwpIDxpbmZvc2VjQGtpdGFiaXNhLmNvbT6JAk4EEwEKADgWIQQO Yuc4kLrk/IP2Q4m9nH7Rip5QeAUCZYH5eAIbAwULCQgHAgYVCgkICwIEFgIDAQIe AQIXgAAKCRC9nH7Rip5QeP43EADOwhApzzD2QY1AYDPhLviq8MIvbCaCEtmcQnVO 0fb+u7Nr9i3UrRLItoc+GUj2k5MkArNw4BqICTGiH/2TAlplajYXEP0afTjLiLMI xwCXgZ2tfmouE+Xovgmx04vCsbVbwRkJNN8kWTlUjwsQEexMkWgunfTFSaw9cfW/ AZnIidXAzNNNCDodOKXpXMdXqVZ0PEF3lEG8TdIbM/l/jyeLbwWvKVf1vBNWzFzG TEguQ9NYSz5OACWwQYyjwzMVtKarw9XkDcZrHEitsrXEqPYr93GwCU1zMf4+3njU P44UjNoLsddLNRMvh1PNpoqWz3Ih/LdapE1P1NXtijn+MVU2lvC+clSc/fZ3ycrv m3I0aaelFWnm8YE72YD01o3qIXXSqrOkzVQmoIwEsTwhtKzlPGFbJ91xjXsmTXXQ YRf7hKsDqZoAR6JaHUGwKu3opUd8nekQ7JWCdXnrGMK2eJ72S2H5pwH4p4M7RY9D MeXjTIMuZa9Kjd6M+YSfFjPqK7DR9rjifu1lMHAWAdq0PeJ+gTN0eJ0FzFRUm9t2 pl4aiRUpRsMFjFPPvAH4ZlNBQ/2fsKkRCmgZQ8xY4Bc8gLhFTPekgTj6bndKoAhF 3g+ioDCdGneCgjTLYxkrXWISzp6vSX0QFL0IzfcmY/ws29RFDQYIH/ZykFBHZCgw JkvDibkCDQRlgfl4ARAAusli5azjLjsW/Bry+CJxLC0s3JftYUPqGRHek3tu122H hjfbNhYm/DHdBQax5c+6bLX8oWzehr2C0hjGkWb60zLDDq8TF7CL5qGdkd0gIAAI r3VC9bOCPM385s0Iq6relhLhXulKPHWp/bI1IdEEvu2kro8zgVhVGWbSyYVrFAdc TgPWF7RxTv2JjT831OSeVsOnIu7I+zLF5j6GO+7VJYO2K0TJucJsSArmwt9iQbO/ eTd0sFvbXKWbrDqT+8KXzZn5Yu7gpsUM1TR397c2t48539f45V+s1lKbp07/245c TzypHCdEHySGuWInYT2YUTOe5Ya8k488Jw+SbL/PYDiJpX26fuJBljmuU1W+lGMb 2XlDP50qAKvR1Ko6xcDHw4U4BcsSXGqlZlLOI3f5ZSazqA+8B6UlPNAAnYCUNaw4 V997R62O8A+mFaimaZ7ik/L4ifYi1hzJqPUPHctJLrs7Um0Qo9YiUYGfVcM2Da6z 5lkdg5pV/0M+7jKwNIjfk2tqlXDpgXuZevY4+GJBXOclDJm0sSTIH9C5adSU9bM8 WTKJdYiORr48HQW62ZaY5YKmIORtpl+muv9VGa6AYpyNqWINgy5hntxy3OQesqV2 F5t15VXgnxvbg1qcvDbSLI0t/LgJ7DcfzV+zW2fIzOjctleroJ4E4Ya6xsVsTwUA EQEAAYkCNgQYAQoAIBYhBA5i5ziQuuT8g/ZDib2cftGKnlB4BQJlgfl4AhsMAAoJ EL2cftGKnlB4pjkP/0/drCU5Wcp8yIYcVuQBEEcLRIupieqfSGLdmseWsFHGPnEC yy/MsNGvHZI/ZXFh1/SeHoX/KYJOlLJFFZfpqxUQwn5cvr+SxAVxQ9os2HfKucYg Me1H38F8ijW0vedvcJN3m3e6haN7n/twthStgPNSLkrdkQntEOaznUkWpQtfImzN hrUTLw02eHeb+Jv148XuhHAN1L8j6UiGBBhT6p+7oc9GHM/7eiitpjj1c+EUSRbF 3Rkcr9KNHFfTinBb8+o/EUCGHBMELYIa68+nmbPX3Cs0y3XYTNQflCSq1+WGqeTM 5nW3Jq4jy7fYAOdez7s3LoImk5XO7I4qWjk4h6gTUmbvueXIKhD9jaNhLDH6yHLa KT8v5+yZB3lgeLnt1YumgD61/M2TQlAu/weP2fQbunYWFFufVgtcPgwGl0Evethq NhDTbE+oJ8agn/nKcM/3dq/bYjMXECptQ+xZoYOBvbQ9WwgIlaW/bVGS5BzNxM00 diy7s3rwJSk7x4H4RTL2i9aBerqw03yl76ZmA6LUHRg2T7yY9QPQDmeVsTj2aPeR MfCe7JUUeL53f9HFn5UNwpSj+B68Xc1U2X/I4dCQTWf5UTkMCaaFfNzKXiIm9qOs ZWhTXzme1GzKN7JYS4WF5l6EPCjlV0OwZMQeKY+fn79fRcBaIEVBcvbdC/bf =HvyO -----END PGP PUBLIC KEY BLOCK-----
Safe Harbor
When conducting vulnerability research, according to this policy, we consider this research conducted under this policy to be:
-
Authorized concerning any applicable anti-hacking laws, and we will not initiate or support legal action against you for accidental, good-faith violations of this policy;
-
Authorized concerning any relevant anti-circumvention laws, and we will not bring a claim against you for circumvention of technology controls;
-
Exempt from restrictions in our Terms of Service (TOS) and/or Acceptable Usage Policy (AUP) that would interfere with conducting security research, and we waive those restrictions on a limited basis; and
-
Lawful, helpful to the overall security of the Internet, and conducted in good faith.
You are expected, as always, to comply with all applicable laws. If legal action is initiated by a third party against you and you have complied with this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
If at any time you have concerns or are uncertain whether your security research is consistent with this policy, please submit a report through one of our Official Channels before going any further.
Note that the Safe Harbor applies only to legal claims under the control of the organization participating in this policy, and that the policy does not bind independent third parties.