Conditions
In order to qualify, the vulnerability must exist in the latest public release (including officially released public betas) of the software. Only security vulnerabilities will qualify. We would love it if people reported other bugs via the appropriate channels, but since the purpose of this program is to fix security vulnerabilities, only bugs that lead to security vulnerabilities will be eligible for rewards. Other bugs will be accepted at our discretion.Guidelines
Please adhere to the following guidelines in order to be eligible for rewards under this disclosure program:Access:
https://apps.apple.com/it/app/airmail-your-mail-with-you/id993160329Credentials:
- Can use any email account to test the appIn-Scope:
- Authentication Protocol Vulnerabilities (For e.g. OAuth Implementation Flaws)Out-of-Scope:
- Do not perform DoS or DDoS attacks.In addition, please allow Airmail at least 90 days to fix the vulnerability before publicly discussing or blogging about it. Airmail believes that security researchers have a First Amendment right to report their research and that disclosure is highly beneficial, and understands that it is a highly subjective question of when and how to hold back details to mitigate the risk that vulnerability information will be misused. If you believe that earlier disclosure is necessary, please let us know so that we can begin a conversation.
Reporting
Just as important as discovering security flaws is reporting the findings so that users can protect themselves and vendors can repair their products.