Security Control | |
---|---|
Continuous Data Backups | |
Multifactor For Developer Accounts | |
Multifactor For Hosting Accounts |
Entity Name | Purpose |
---|---|
Github | Development Platform |
Medium | Blog Hosting |
Mapbox | Map Tile Images |
Microsoft Azure | Cloud Hosting |
Paddle | Payment Processing |
Postmark | Email Parsing and Bulk Email Sending |
Proton Mail | Employee Email |
UptimeRobot | Uptime and Reliability Monitoring |
Scarlet Shark has established a Vulnerability Disclosure Program to provide security researchers with clear guidelines for identifying vulnerabilities in Scarlet Shark systems and websites. This program also communicates Scarlet Shark's preferences for submitting any discovered vulnerabilities.
The Vulnerability Disclosure Policy outlines the systems and types of research included in this program, explains the process for submitting vulnerability reports, and details the requirements for public disclosure of submitted vulnerabilities.
Security researchers must comply with all applicable Federal, State, and local laws in connection with the security research activities or other participation in this Vulnerability Disclosure Program.
Efforts made in good faith to comply with this policy during all security research will be considered authorized. Scarlet Shark will work closely with the researcher to understand and promptly resolve any issues and will not recommend or pursue legal action related to your research. Should legal action be initiated by a third party against the security researcher for research conducted in accordance with this policy, the Scarlet Shark will reaffirm this authorization.
This policy is for security researchers interested in reporting system security vulnerabilities and is intended for authorized Scarlet Shark publicly available systems/services only. This policy applies to anyone wishing to conduct vulnerability discovery activities, including research and testing conducted on the DOC's publicly available systems/services within the Scarlet Shark domains. Specifically, this policy applies to the following Scarlet Shark websites, information systems, and digital services intended for public use or made internet-accessible:
Information systems, websites, or services owned and operated by vendors or other entities; vulnerabilities found in information systems from our vendors and other entities fall outside of this policy's scope and should be reported directly to the vendor according to their disclosure policy (if any).
Non-public facing or non-internet-accessible websites, information systems, and digital services.
The following websites, information systems, and services are excluded from the testing provisions and legal protections afforded to Reporters within this policy. Suppose Reporters are uncertain of whether a website, information system, or digital service is in-scope of this policy. In that case, it is recommended that they reach out to the DOC Vulnerability Disclosure Program at support [AT] scarletshark.com.
Under this policy, "research" means activities in which you:
Scarlet Shark is committed to patching vulnerabilities within (90) days or less and disclosing the details of those vulnerabilities when patches are published. We believe that public disclosure of vulnerabilities is an essential part of the vulnerability disclosure process, and that one of the best ways to improve software is to enable everyone to learn from each other's mistakes.
At the same time, disclosure in the absence of a readily available patch tends to increase risk rather than reduce it. Therefore, we ask that security researchers refrain from sharing reports with others or releasing reports to the public while patching is ongoing. If there is a need to inform others of the submitted report before the patch is available, please coordinate with Scarlet Shark via email at support [AT] scarletshark.com before release for assessment.
Information submitted under this policy shall be used by the Scarlet Shark for defensive cybersecurity purposes (i.e. to mitigate or remediate vulnerabilities). If an issue has been reported and determined to be both within the program scope and a valid security issue, Scarlet Shark will validate the finding(s), and the security researcher can disclose the vulnerability after a resolution has been issued. The details within the Vulnerability Intake form may be submitted to an independent third-party vendor for evaluation and handling.
The following test methods are not authorized by the Scarlet Shark:
Questions or suggestions regarding this policy may be sent to support [AT] scarletshark.com