At Guidde Inc., we're committed to maintaining the highest security standards for our cloud-based services and customer data. This vulnerability disclosure portal enables security researchers to report potential security concerns within our SaaS infrastructure and applications.
Scope
In-Scope Targets:
- guidde.com and associated subdomains
- Guidde web application (app.guidde.com)
- Guidde API endpoints (app.guidde.com)
- Desktop applications published under Guidde Inc.
- Client-side browser extensions
- Authentication and authorization mechanisms
- Cloud infrastructure configuration
Security Researcher Partnership
We pledge to:
- Maintain confidential communication channels with researchers through encrypted email or secure messaging
- Provide timely acknowledgment according to our “Response Timeline”
- Issue security advisories for critical vulnerabilities after patching
- Offer recognition through our security hall of fame
- Consider monetary rewards for critical findings based on severity and impact
Response Timeline
- Critical Vulnerabilities (CVSS 9.0-10.0): 24-hour initial response, 7-day fix target
- High Vulnerabilities (CVSS 7.0-8.9): 48-hour initial response, 14-day fix target
- Medium Vulnerabilities (CVSS 4.0-6.9): 72-hour initial response, 30-day fix target
- Low Vulnerabilities (CVSS 0.1-3.9): 5-day initial response, 90-day fix target
Guidelines for Submissions
Please provide:
- Detailed proof-of-concept code or exploit steps
- Impact assessment and affected components
- CVSS v3.1 score calculation when applicable
- Any tools or scripts used during discovery
- Suggested remediation approaches
- Video/screenshots demonstrating the vulnerability
Program Exclusions
We do not accept reports related to:
- Physical security assessments
- Social engineering or phishing attempts
- Denial-of-service testing
- Brute force attacks
- Rate limiting issues
- Missing security headers that don't lead to exploitable vulnerabilities
- Self-XSS requiring significant user interaction
- Clickjacking without demonstrated security impact
- Recently disclosed public CVEs (within 2 weeks)
- Vulnerabilities in outdated browsers/platforms
- Third-party components without working proof-of-concept
Safe Harbor
Security researchers who:
- Follow this policy
- Make good faith efforts to avoid privacy violations, data destruction, or service interruption
- Do not exploit vulnerabilities beyond necessary proof-of-concept
Will be protected from legal action by Guidde Inc.