EPI-USE Labs takes data privacy and security seriously. As a provider of
software and services we recognize the value and importance of
appropriately preserving the confidentiality, integrity, and availability
of all our software and services.
We are committed to addressing security issues through a coordinated and
constructive approach to further enhance security and to protect both user
and intellectual property.
Reporting security issues
EPI-USE Labs will investigate legitimate reports and make every effort to
address any vulnerabilities disclosed as quickly as possible and will work
with security researchers that comply with the following responsible
disclosure guidelines:
-
If you believe you have discovered a vulnerability in a product or have
a security incident to report, please send all correspondence to the
following address
disclosure@labs.epiuse.com
should you wish to encrypt the message, please use our
PGP public key to encrypt your
communication with us.
-
Please include the phrase "vulnerability detected" in the subject line
of the email.
-
Provide details of the vulnerability or incident including information
needed to reproduce and validate it.
-
Make good faith effort to avoid privacy violations, destruction of data,
access or modification of data (personal or otherwise) and or
interruption or degradation of EPI-USE Labs systems or services.
-
Provide us with a realistic timeframe to investigate, respond to and
correct the issue before disclosing the event on public forum.
Out of scope vulnerabilities
-
Clickjacking on pages with no sensitive actions or no authenticated actions
-
Software version disclosure/Banner identification issues
-
Missing email best practices (invalid, incomplete, or missing SPF/DKIM/DMARC records etc.)
-
Missing best practices in SSL/TLS configuration
-
Any activity that could lead to the disruption of our service (DoS) (unless proven to be a configuration issue or a software bug)
-
Open redirect - unless an additional security impact can be demonstrated
-
Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions
How to verify a security.txt file from one of our products
# Download our PGP public key
wget https://security.epiuselabs.com/epi-use-labs-security.asc
# Download the security.txt file
wget https://clientcentral.io/.well-known/security.txt
# Import our PGP public key
gpg --import epi-use-labs-security.asc
# Verify the content of security.txt
gpg --verify security.txt
The output should look like:
gpg: Good signature from "EPI-USE Labs Security <security@labs.epiuse.com>"
How to encrypt the message
gpg --encrypt --sign --armor -r security@labs.epiuse.com message.txt
This will result in a message.txt.asc
file which you can send the contents to disclosure@labs.epiuse.com