1
1
# Coder Security
2
2
3
- Coder welcomes feedback from security researchers and the general public
4
- to help improve our security. If you believe you have discovered a vulnerability,
3
+ Coder welcomes feedback from security researchers and the general public to help
4
+ improve our security. If you believe you have discovered a vulnerability,
5
5
privacy issue, exposed data, or other security issues in any of our assets, we
6
6
want to hear from you. This policy outlines steps for reporting vulnerabilities
7
7
to us, what we expect, what you can expect from us.
@@ -10,64 +10,72 @@ You can see the pretty version [here](https://coder.com/security/policy)
10
10
11
11
# Why Coder's security matters
12
12
13
- If an attacker could fully compromise a Coder installation, they could spin
14
- up expensive workstations, steal valuable credentials, or steal proprietary
15
- source code. We take this risk very seriously and employ routine pen testing,
16
- vulnerability scanning, and code reviews. We also welcome the contributions
17
- from the community that helped make this product possible.
13
+ If an attacker could fully compromise a Coder installation, they could spin up
14
+ expensive workstations, steal valuable credentials, or steal proprietary source
15
+ code. We take this risk very seriously and employ routine pen testing,
16
+ vulnerability scanning, and code reviews. We also welcome the contributions from
17
+ the community that helped make this product possible.
18
18
19
19
# Where should I report security issues?
20
20
21
- Please report security issues to security@coder.com , providing
22
- all relevant information. The more details you provide, the easier it will be
23
- for us to triage and fix the issue.
21
+ Please report security issues to security@coder.com , providing all relevant
22
+ information. The more details you provide, the easier it will be for us to
23
+ triage and fix the issue.
24
24
25
25
# Out of Scope
26
26
27
- Our primary concern is around an abuse of the Coder application that allows
28
- an attacker to gain access to another users workspace, or spin up unwanted
27
+ Our primary concern is around an abuse of the Coder application that allows an
28
+ attacker to gain access to another users workspace, or spin up unwanted
29
29
workspaces.
30
30
31
31
- DOS/DDOS attacks affecting availability --> While we do support rate limiting
32
- of requests, we primarily leave this to the owner of the Coder installation. Our
33
- rationale is that a DOS attack only affecting availability is not a valuable
34
- target for attackers.
32
+ of requests, we primarily leave this to the owner of the Coder installation.
33
+ Our rationale is that a DOS attack only affecting availability is not a
34
+ valuable target for attackers.
35
35
- Abuse of a compromised user credential --> If a user credential is compromised
36
- outside of the Coder ecosystem, then we consider it beyond the scope of our application.
37
- However, if an unprivileged user could escalate their permissions or gain access
38
- to another workspace, that is a cause for concern.
36
+ outside of the Coder ecosystem, then we consider it beyond the scope of our
37
+ application. However, if an unprivileged user could escalate their permissions
38
+ or gain access to another workspace, that is a cause for concern.
39
39
- Vulnerabilities in third party systems --> Vulnerabilities discovered in
40
- out-of-scope systems should be reported to the appropriate vendor or applicable authority.
40
+ out-of-scope systems should be reported to the appropriate vendor or
41
+ applicable authority.
41
42
42
43
# Our Commitments
43
44
44
45
When working with us, according to this policy, you can expect us to:
45
46
46
- - Respond to your report promptly, and work with you to understand and validate your report;
47
- - Strive to keep you informed about the progress of a vulnerability as it is processed;
48
- - Work to remediate discovered vulnerabilities in a timely manner, within our operational constraints; and
49
- - Extend Safe Harbor for your vulnerability research that is related to this policy.
47
+ - Respond to your report promptly, and work with you to understand and validate
48
+ your report;
49
+ - Strive to keep you informed about the progress of a vulnerability as it is
50
+ processed;
51
+ - Work to remediate discovered vulnerabilities in a timely manner, within our
52
+ operational constraints; and
53
+ - Extend Safe Harbor for your vulnerability research that is related to this
54
+ policy.
50
55
51
56
# Our Expectations
52
57
53
- In participating in our vulnerability disclosure program in good faith, we ask that you:
58
+ In participating in our vulnerability disclosure program in good faith, we ask
59
+ that you:
54
60
55
- - Play by the rules, including following this policy and any other relevant agreements.
56
- If there is any inconsistency between this policy and any other applicable terms, the
57
- terms of this policy will prevail;
61
+ - Play by the rules, including following this policy and any other relevant
62
+ agreements. If there is any inconsistency between this policy and any other
63
+ applicable terms, the terms of this policy will prevail;
58
64
- Report any vulnerability you’ve discovered promptly;
59
- - Avoid violating the privacy of others, disrupting our systems, destroying data, and/or
60
- harming user experience;
65
+ - Avoid violating the privacy of others, disrupting our systems, destroying
66
+ data, and/or harming user experience;
61
67
- Use only the Official Channels to discuss vulnerability information with us;
62
- - Provide us a reasonable amount of time (at least 90 days from the initial report) to
63
- resolve the issue before you disclose it publicly;
64
- - Perform testing only on in-scope systems, and respect systems and activities which
65
- are out-of-scope;
66
- - If a vulnerability provides unintended access to data: Limit the amount of data you
67
- access to the minimum required for effectively demonstrating a Proof of Concept; and
68
- cease testing and submit a report immediately if you encounter any user data during testing,
69
- such as Personally Identifiable Information (PII), Personal Healthcare Information (PHI),
70
- credit card data, or proprietary information;
71
- - You should only interact with test accounts you own or with explicit permission from
68
+ - Provide us a reasonable amount of time (at least 90 days from the initial
69
+ report) to resolve the issue before you disclose it publicly;
70
+ - Perform testing only on in-scope systems, and respect systems and activities
71
+ which are out-of-scope;
72
+ - If a vulnerability provides unintended access to data: Limit the amount of
73
+ data you access to the minimum required for effectively demonstrating a Proof
74
+ of Concept; and cease testing and submit a report immediately if you encounter
75
+ any user data during testing, such as Personally Identifiable Information
76
+ (PII), Personal Healthcare Information (PHI), credit card data, or proprietary
77
+ information;
78
+ - You should only interact with test accounts you own or with explicit
79
+ permission from
72
80
- the account holder; and
73
81
- Do not engage in extortion.
0 commit comments