When a vulnerability is found, it must get into the right hands quickly to ensure it'll be resolved safely without public harm. Organizations typically publish a vulnerability disclosure policy about how they want to receive information about potential vulnerabilities in their products or online services (see ISO 29147). Some organizations, however, don't have well-defined methods of receiving vulnerability reports from external finders.
In the absence of a vulnerability disclosure policy, attempts to report security vulnerabilities often carry considerable legal risk for the hacker, causing many to simply withhold vulnerable information or publish anonymously. In these cases, it's impossible to achieve an optimal outcome that ensures security vulnerabilities are safely resolved, and it causes the internet to be less safe than it could be.
HackerOne provides Disclosure Assistance to help friendly hackers disclose vulnerabilities to any organization and better secure the internet.
What is Disclosure Assistance?
When hackers discover a vulnerability and the organization doesn't have a vulnerability disclosure policy, with Disclosure Assistance, HackerOne will work with friendly hackers on a best-effort basis to:
Verify the legitimacy of a vulnerability.
Reach out to and verify the identity of an individual at the affected organization.
Share the vulnerability with the organization so it can be resolved.
A hacker should request Disclosure Assistance after following these steps:
They find a vulnerability.
They search the HackerOne Directory for a published security contact method and attempt alternative means of contact.
They exhaust their options in their attempts to contact the organization.
How Does it Work?
To request Disclosure Assistance:
Click Request Disclosure Assistance.
Fill out the report form.
Click Submit Report.
The HackerOne Disclosure Assistance team receives the vulnerability information, verifies the legitimacy of the bug, and determines the potential impact.
HackerOne will attempt to contact the affected organization and verify the identity of an appropriate point of contact to receive the vulnerability information.
Once their identity is verified, an email is sent to the point of contact with a secret link to the contents of the bug report and the interactions between the hacker and HackerOne. At this point, the vulnerability information has been successfully shared with the affected organization.
The point of contact can either:
Create an account on HackerOne to interact with the finder directly or provide updates on the resolution of the vulnerability.
Contact email@example.com for assistance on how to proceed.
At the end of this process, HackerOne will inquire about the organization's preferred vulnerability disclosure process (based on ISO 29147) to avoid the need for Disclosure Assistance in the future.
Questions specific to a particular report should be asked on the report itself. If you need support or have questions on the Disclosure Assistance process, please contact firstname.lastname@example.org.