Image Relay's Vulnerability Disclosure Policy
Vulnerability Disclosure Philosophy
Image Relay believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between Image Relay and Security Researchers. Together, our vigilant expertise promotes the continued security and privacy of Image Relay customers, products, and services.
Security Researchers
Image Relay accepts vulnerability reports from all sources such as independent security researchers, industry partners, vendors, customers and consultants. Image Relay defines a security vulnerability as an unintended weakness or exposure that could be used to compromise the integrity, availability or confidentiality of our products and services.
Scope
This policy applies to:
  • https://launch.imagerelay.io/
  • https://bug-bounty-pin-cushion.imagerelay.com/login
  • https://bug-bounty-pin-cushion.imagerelay.com/
  • https://bug-bounty-pin-cushion.imagerelay.com/fl/c287717d1bd140f78faebe7c7c702e20
  • https://bug-bounty-pin-cushion.imagerelay.com/ml/58b027c7604d41ee90f58b096357989d
  • https://bug-bounty-pin-cushion.imagerelay.com/share/05902825d3964ba5a37540aca8186709
  • https://bug-bounty-pin-cushion.imagerelay.io/sharing/bcf0fb17-3f27-44a5-8ae3-64af24cfabc4
  • https://bug-bounty-pin-cushion.imagerelay.com/sb/aa91393b-686f-4c2a-8423-9a9634e943a9/spring-classics
  • product catalog share link
This policy does not apply to:
  • https://www.imagerelay.com
  • all customer subdomains current and future (https://[customer].imagerelay.com)
Our Commitment to Researchers
  • Trust. We maintain trust and confidentiality in our professional exchanges with security researchers.
  • Respect. We treat all researchers with respect and recognize your contribution for keeping our customers safe and secure.
  • Transparency. We will work with you to validate and remediate reported vulnerabilities in accordance with our commitment to security and privacy.
  • Common Good. We investigate and remediate issues in a manner consistent with protecting the safety and security of those potentially affected by a reported vulnerability.
What We Ask of Researchers
  • Trust. We request that you communicate about potential vulnerabilities in a responsible manner, providing sufficient time and information for our team to validate and address potential issues.
  • Respect. We request that researchers make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction of data during security testing.
  • Transparency. We request that researchers provide the technical details and background necessary for our team to identify and validate reported issues, using the form below.
  • Common Good. We request that researchers act for the common good, protecting user privacy and security by refraining from publicly disclosing unverified vulnerabilities until our team has had time to validate and address reported issues.
Vulnerability Reporting
Image Relay recommends that security researchers share the details of any suspected vulnerabilities across any asset owned, controlled, or operated by Image Relay (or that would reasonably impact the security of Image Relay and our users) using the web form below. The Image Relay Security team will acknowledge receipt of each vulnerability report, conduct a thorough investigation, and then take appropriate action for resolution.
Summary Title
*
Help us get an idea of what this vulnerability is about
Target *

Select the vulnerable target
Targets that are not explicitly in scope are not eligible for acceptance

Technical Severity *
The Vulnerability Rating Taxonomy is the baseline guide used for classifying technical severity
Vulnerability Details
*
URL / Location of vulnerability (optional)
For example: https://secure.server.com/some/path/file.php
Description *

Describe the vulnerability and its impact
Provide a proof of concept or replication steps

Email *
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of Image Relay.